EC-Council’s CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure. Digital forensic practices stem from forensic science, the science of collecting and examining evidence or materials. Digital or computer forensics focuses on the digital domain including computer forensics, network forensics, and mobile forensics. As the cyber security profession evolves, organizations are learning the importance of employing digital forensic practices into their everyday activities. Computer forensic practices can help investigate attacks, system anomalies, or even help System administrators detect a problem by defining what is normal functional specifications and validating system information for irregular behaviors.
2. Course Description
Computer Hacking Forensic Investigator (CHFI) Training will provides Understand the
concept of forensic science, cyber crime, and steps in forensic investigation Learn the
laws involved and work accordingly to search and seize the computers with a warrant
List roles of first Responder, evaluate electronic crime scene, conduct preliminary
interviews; collect, preserve and transport electronic evidence along with complete
documentation Define different types of digital evidence, rules of evidence, digital
evidence examination process, and electronic crime and digital evidence consideration
by crime category Setting computer forensics lab Retrieve existing and deleted files
from different operation systems using different processes such as Access Data FTK,
Encase, Stenography and other techniques Crack system and application passwords
Perform log capturing to establish event correlation Investigate network traffic, emails,
and attacks Practice forensic process on mobile devices with different operating
systems.
CRAW Security
3. Target to Audience
Individuals
School Students
College Students
IT Professionals
IT Officers
IT and LAW Officers
Corporates
IT Training Firms
IT Consultants
IT Experts
IT Officers
IT Institutions & Colleges
IT Graduated or Computer Science
Students
CRAW Security
4. Duration of Program
1 Month (2 Hours per Day )
15 Days (4 Hours per Day)
8 Days (5-6 Hours per Day)
5 Days (8 Hours per Day)
CRAW Security
5. Certification
The CHFI 312-49 exam will be conducted on the last day of training. Students need to
pass the online Parametric exam to receive the CHFI certification.
CRAW Security
6. Exam Details
CRAW Security
Number of Questions: 150
Passing Score: 70%
Test Duration: 4 hours
Test Format: MCQ
Test Delivery: ECC exam portal
7. What we try to Give
We try to give you real industry standards with best possible quality to all our
customers and clients. We focus on Various sections of Society and running a national
level campaign to literate Students from all parts of company who can’t Afford “Basic
IT Computer Training”. We wish we could teach as many students from all over the
world and make it a beautiful place to work. We work on minimum gross margins to
strength the Indian It infrastructure.
CRAW Security
9. What is New in the CHFI
Course
14 comprehensive modules and 39 Labs.
More than 40 percent of new labs.
More than 400 new/updated tools
Classroom friendly curriculum with diagrammatic representation of
concepts and examples.
New and rich presentation style with eye catching graphics
Coverage of latest operating systems
Updated patch management and testing environment
Well tested, result oriented, descriptive and analytical lab manual to evaluate the
presented concepts.
CRAW Security
10. Course Outline of CHFI
CRAW Security
Computer Forensics in Today’s World
Computer Forensics Investigation Process
Understanding Hard Disks and File Systems
Operating System Forensics
Defeating Anti-Forensics Techniques
Data Acquisition and Duplication
Network Forensics
Investigating Web Attacks
Database Forensics
Cloud Forensics
Malware Forensics
Investigating Email Crimes
Mobile Forensics
Investigative Reports
11. Prerequisites
IT/forensics professionals with basic knowledge on IT/cyber security, Computer
Forensics, and incident response Prior completion of CEH training would be an
advantage.
CRAW Security
12. Anyone interested in cyber forensics/investigations Attorneys, legal consultants,
and lawyers.
Law enforcement officers
Police officers
Federal/ government agents
Defence and military
Detectives/ investigators
Incident response team members
Information security managers
Network defenders
IT professionals, IT directors/managers
System/network engineers
Security analyst/ architect/ auditors/ consultants
CRAW Security
Who should attend
13. Contact Us
CRAW Security
1st Floor, Kehar Singh Estate, Plot no. 4, Lane no. 2, Saidulajab,
Saket Metro Station, New Delhi- 110030
Call Us
011-40394315 | +91-9650202445 | +91-9650677445
Mails Us
training@craw.in
Visit Us
www.crawsecurity.com | www.craw.in
CRAW Security