Digital technologies are changing the face of business. As organizations rapidly embracing digital technologies such as cloud, mobile, big data and IoT, the context of digital forensics is more relevant than before. The growing number of cybercrimes has changed the role of forensics from DNA to Digital.
CHFIv9, the latest version of the program has been designed for professionals handling digital evidence while investigating cybercrimes. It is developed by an experienced panel of subject matter experts and industry specialists, and has set global standards for computer forensics best practices.
COURSE DESCRIPTION (continued)
In addition, it also aims at elevating the knowledge, understanding, and skill levels of in cyber security and forensics practitioners.
CHFIv9 covers detailed methodological approach to computer forensic and evidence analysis. It provides the necessary skillset for identification of intruder’s footprints and gathering necessary evidence for its prosecution.
All major tools and theories used by cyber forensic industry are covered in the curriculum. The certification can fortify the applied knowledge level of anyone who is concerned about the integrity of the network and digital investigations.
WHO SHOULD ATTEND
The CHFI program is designed for anyone interested in cyber forensics/investigations, attorneys, legal consultants, lawyers, law enforcement officers, police officers, federal/government agents, defense and military, detectives/investigators, incident response team members, information security managers, network defenders, IT professionals, IT directors/managers, system/network engineers, security analyst/consultants/auditors…
The CHFI 312-49 exam can be conducted on the last day of training. Students must pass the exam on the ECC exam platform to get their certification.
Exam title: Certified Hacking Forensic Investigator (ANSI)
Exam code: CHFI 312-49
Number of questions: 150 MCQ
Duration: 4 hours
Delivery : ECC exam
Module 01: Computer Forensics in Today’s World
Module 02: Computer Forensics Investigation Process
Module 03: Understanding hard disks and file systems
Module 04: Data acquisition and duplication
Module 05: Defending anti-forensics techniques
Module 06: Operating system forensics
Module 07: Network forensics
COURSE PLAN (continued)
Module 08: Investigating web attacks
Module 09: Database forensic
Module 10: Cloud forensic
Module 11: Malware forensic
Module 12: Investigating email crimes
Module 13: Mobile forensic
Module 14: Forensic report writing and presentation