SlideShare a Scribd company logo
1 of 8
Download to read offline
CHFI v9 01
C HFIComputer Hacking Forensic
INVESTIGATOR
TM
Every crime leaves a trail of evidence
@2017 EC-Council. All Rights Reserved. | CHFI 01/17 | www.eccouncil.org
Computer Hacking Forensic Investigator v9
SECURING
NETWORKS WITH
FORENSIC
SCIENCE
CHFI v9 02
INTRODUCING CHFI V9:
WORLD’S MOST COMPREHENSIVE
COMPUTER FORENSIC
CERTIFICATION PROGRAM
Digital technologies are changing the face of
business. As organizations rapidly embracing
digital technologies such as cloud, mobile, big
data and IOT, the context of digital forensics
is more relevant than before. The growing
number of cybercrimes has changed the role of
forensics from DNA to Digital.
According to the market research report
published by IndustryARC, by 2020, the digital
forensics market will reach 4.8 billion USD.
IndustryARC also predicts that the maximum
use of digital forensics is from the federal
sector and this will grow from $1,097.2 million
in 2015 to $2,060.5 million by 2020. The major
drivers for this are increasing threats from
cybercrime and terrorist attacks. Foote Partners,
which tracks information technology (IT)
jobs across all skill levels, projects the global
demand for cyber security talent to rise to six
million by 2019, with an expected shortfall of
1.5 million professionals.
Over the last many years, EC-Council’s CHFI
certification has gained massive traction
and recognition amongst Fortune 500
enterprises globally. It has immensely benefited
professionals from law enforcement, criminal
investigation, defense, and security field. CHFI
v9, the latest version of the program has been
designed for professionals handling digital
evidence while investigating cybercrimes. It is
developed by an experienced panel of subject
matter experts and industry specialists, and
also has set global standards for computer
forensics best practices. In addition, it also aims
at elevating the knowledge, understanding, and
skill levels of in cyber security and forensics
practitioners.
CHFI v9 03
About CHFI v9
CHFI v9 covers detailed methodological
approach to computer forensic and evidence
analysis. It provides the necessary skillset
for identification of intruder’s footprints and
gathering necessary evidence for its prosecution.
All major tools and theories used by cyber
forensic industry are covered in the curriculum.
The certification can fortify the applied
knowledge level of law enforcement personnel,
system administrators, security officers, defense
and military personnel, legal professionals,
bankers, computer and network security
professionals, and anyone who is concerned
about the integrity of the network and digital
investigations.
CHFI provides necessary skills to
perform effective digital forensic
investigation
It is a comprehensive course covering major
forensic investigation scenarios that enables
students to acquire necessary hands-on experience
on various forensic investigation techniques and
standard forensic tools necessary to successfully
carryout computer forensic investigation leading to
prosecution of perpetrators
CHFI presents a methodological approach to
computer forensic including searching and seizing,
chain-of-custody, acquisition, preservation, analysis
and reporting of digital evidence
CHFI v9 04
Courseware
Details
Course Title: Computer Hacking Forensic Investigator (CHFI) v9
Duration: 40 hours (5 days, 9:00AM – 5:00PM)
Class Format:
•	 Instructor-led classroom – Authorized Training Center (ATC)
•	 Live online training – iClass
•	 Number of Questions: 150
•	 Passing Score: 70%
•	 Test Duration: 4 hours
•	 Test Format: MCQ
•	 Test Delivery: ECC exam portal
•	 14 comprehensive modules and 39
labs
•	 More than 40 percent of new labs
•	 More than 400 new/updated tools
•	 Classroom friendly curriculum with
diagrammatic representation of
concepts and examples
•	 New and rich presentation style
with eye catching graphics
•	 Coverage of latest operating
systems
•	 Updated patch management and
testing environment
•	 Well tested, result oriented,
descriptive and analytical lab
manual to evaluate the presented
concepts
•	 IT/forensics professionals with basic knowledge on IT/cyber security,
computer forensics, and incident response
•	 Prior completion of CEH training would be an advantage
COURSE DETAILS EXAM DETAILS
WHAT’S NEW IN CHFI V9PREREQUISITES
WHO SHOULD ATTEND
•	 Anyone interested in cyber
forensics/investigations
•	 Attorneys, legal consultants, and
lawyers
•	 Law enforcement officers
•	 Police officers
•	 Federal/ government agents
•	 Defense and military
•	 Detectives/ investigators
•	 Incident response team
members
•	 Information security managers
•	 Network defenders
•	 IT professionals, IT directors/
managers
•	 System/network engineers
•	 Security analyst/ architect/
auditors/ consultants
CHFI v9 05
Course Outline
CHFI v9 curriculum is a comprehensive course with 14 training modules covering major forensic
investigation scenarios
Module 1. Computer forensics in
today’s world
Module 8. Investigating web attacks
Module 9. Database forensic
Module 10. Cloud forensic
Module 11. Malware forensic
Module 12. Investigating email crimes
Module 13. Mobile forensic
Module 14. Forensics report writing
and presentation
Module 2. Computer forensics
investigation process
Module 3. Understanding hard disks
and file systems
Module 5. Defeating anti-forensics
techniques
Module 6. Operating system forensics
Module 7. Network forensics
Module 4. Data acquisition and
duplication
CHFI v9 06
Why CHFI
•	 The CHFI v9 program has been redesigned and updated after thorough investigation including
current market requirements, job tasks analysis, and recent industry focus on forensic skills
•	 It is designed and developed by experienced subject matter experts and digital forensics practitioners
•	 CHFI is a complete vendor neutral course covering all major forensics investigations technologies and
solutions
•	 CHFI has detailed labs for hands-on learning experience. On an average, approximately 50% of
training time is dedicated to labs
•	 It covers all the relevant knowledge-bases and skills to meets with regulatory compliance standards
such as ISO 27001, PCI DSS, SOX, HIPPA, etc.
•	 The student kit contains large number of white papers for additional reading
•	 The program presents a repeatable forensics investigation methodology required from a versatile
digital forensic professional which increases employability
•	 The student kit contains several forensics investigation templates for evidence collection, chain-of-
custody, final investigation reports, etc.
•	 The program comes with cloud-based virtual labs enabling students to practice various investigation
techniques in a real-time and simulated environment
CHFI v9 07
Endorsements
and
Testimonials
ENDORSEMENTS TESTIMONIALS
NSA and CNSS: Compliant with 4012 (Senior System Managers)
training standards for information security professionals in the
federal government by the United States National Security Agency
(NSA) and the Committee on National Security Systems (CNSS)
“It is my pleasure to take the time to praise the EC-Council for having
such a magnificent class, specifically THE Computer Hacking Forensic
Investigator course. The course had an abundance of information,
utilities, programs, and hands on experience. I am a consultant at Dell
and we do have a lot of technical training, but I must comment that
this one is one of the best trainings I have seen in several years. I will
definitively recommend this course to all my colleagues.”
— Hector Alvarez,CHFI,Enterprise & Storage Consultant,
Dell Corporation,Austin,Texas
“ All the treatment has been excellent, the material and the content of
the course overcomes my expectations. Thanks to the instructor and to
Itera for their professionalism.”
— Sergio Lopez Martin,CHFI,Security Sales,IBM,Spain
“ CHFI is a certification that gives an complete overview of the
process that a forensic investigator must follow when is investigating
a cybercrime. It includes not only the right treatment of the digital
evidence in order to be accepted in the Courts but also useful tools and
techniques that can be applied to investigate an incident.”
—Virginia Aguilar,CHFI,KPMG,Madrid
“ The Computer Hacking Forensic Investigator (CHFI) certification
has been instrumental in assuring both my company and our clients
that my skillset is among the elite in the cyber security and response
profession. The CHFI allows my company to readily identify to our
DoD clients that our team is trained to perform the rigorous functions
required of cyber threat response team. Our company can now better
brand our capability to investigate cyber security incidents, perform
computer/malware forensic analysis, identify active threats, and report
our findings.”
— Brad W.Beatty,Cyber Security Analyst,Booz Allen Hamilton,USA
DVA: The Department of Veterans Affairs (DVA) has included CHFI
under its GI Bill for the reimbursement of test fees for veterans
and other eligible persons in accordance with the provisions of PL
106-419
KOMLEK and CPS: The Malaysian Military Cyber Security Warfare
Department (KOMLEK) has stipulated their military professionals
to be CHFI Certified as part of their Cyber Warfare Training
Program (CPS)
NICF: Accepted into National Infocomm Competency Framework
(NICF) infocomm professionals competency requirement list
CHFI v9 08
About EC-Council
EC-Council (International Council of E-Commerce Consultants) is one of the world's largest certification bodies for information
security professionals. EC-Council is a member-based organization that certifies individuals in various information security
and ebusiness skills. It has been certified by American National Standards Institute to meet its ANSI 17024 standard. It is the
owner and creator of the world famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI) and
EC-Council Certified Security Analyst (ECSA)/License Penetration Tester (LPT) programs, and as well as many other
programs. These programs are offered in over 140 countries and have trained over 150,000 and certified more than 60,000
security professionals through a training network of over 500 training partners globally.
Individuals who have achieved EC-Council certifications include those from some of the finest organizations around the world
such as the US Army, the FBI, Microsoft, IBM and the United Nations.
@2017 EC-Council. All Rights Reserved. | CHFI 01/17 | www.eccouncil.org

More Related Content

What's hot

Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber StrategyIan Kelly
 
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex TrainingDigital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex TrainingBryan Len
 
Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6hymasakhamuri
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Hamisi Kibonde
 
Maritime Cyber Security Education
Maritime Cyber Security EducationMaritime Cyber Security Education
Maritime Cyber Security EducationValentin Bañaco
 
Cyber Defence Intelligence (CDI)
Cyber Defence Intelligence  (CDI)Cyber Defence Intelligence  (CDI)
Cyber Defence Intelligence (CDI)FloydCarrasquillo
 
Ceh v11 all you need to know-converted
Ceh v11   all you need to know-convertedCeh v11   all you need to know-converted
Ceh v11 all you need to know-convertedredteamacademypromo
 
Research paper -- neri
Research paper -- neriResearch paper -- neri
Research paper -- neriaejay_neri
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthyRussell Publishing
 
Internship ankita jain
Internship ankita jainInternship ankita jain
Internship ankita jainAnkita Jain
 
Learn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseLearn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseInfosec
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Amrit Chhetri
 
How to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First TimeHow to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First TimeMercury Solutions Limited
 
Maranan chap.2 lab 1
Maranan chap.2 lab 1Maranan chap.2 lab 1
Maranan chap.2 lab 1maranan_zyra
 
Brua computer forensics specialist
Brua computer forensics specialistBrua computer forensics specialist
Brua computer forensics specialistfernando_bruaj
 
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsWebinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsSynopsys Software Integrity Group
 

What's hot (20)

Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber Strategy
 
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex TrainingDigital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
 
Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
Maritime Cyber Security Education
Maritime Cyber Security EducationMaritime Cyber Security Education
Maritime Cyber Security Education
 
Cyber Defence Intelligence (CDI)
Cyber Defence Intelligence  (CDI)Cyber Defence Intelligence  (CDI)
Cyber Defence Intelligence (CDI)
 
Ceh v11 all you need to know-converted
Ceh v11   all you need to know-convertedCeh v11   all you need to know-converted
Ceh v11 all you need to know-converted
 
Research paper -- neri
Research paper -- neriResearch paper -- neri
Research paper -- neri
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
Internship ankita jain
Internship ankita jainInternship ankita jain
Internship ankita jain
 
Learn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseLearn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident response
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
How to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First TimeHow to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First Time
 
Maranan chap.2 lab 1
Maranan chap.2 lab 1Maranan chap.2 lab 1
Maranan chap.2 lab 1
 
Brua computer forensics specialist
Brua computer forensics specialistBrua computer forensics specialist
Brua computer forensics specialist
 
Mary hankins fernando br ua
Mary hankins fernando br uaMary hankins fernando br ua
Mary hankins fernando br ua
 
Cataluña mary hapkins
Cataluña mary hapkinsCataluña mary hapkins
Cataluña mary hapkins
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsWebinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
 

Similar to Computer Hacking Forensic Investigator v9 | EC-Council

Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.cnetworks
 
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.cnetworks
 
CHFI Certification
CHFI CertificationCHFI Certification
CHFI CertificationSagarNegi10
 
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...CRAW CYBER SECURITY PVT LTD
 
Security5Security5 is an entry level certifi cation fo.docx
Security5Security5 is an entry level certifi cation fo.docxSecurity5Security5 is an entry level certifi cation fo.docx
Security5Security5 is an entry level certifi cation fo.docxbagotjesusa
 
Video Surveillance in the Cloud?
Video Surveillance in the Cloud?  Video Surveillance in the Cloud?
Video Surveillance in the Cloud? ijcisjournal
 
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docCyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docThowfeekFayees
 
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptxTop 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptxinfosec train
 
An Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key AgreementAn Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key Agreementijtsrd
 
Huwei Cyber Security Presentation
Huwei Cyber Security PresentationHuwei Cyber Security Presentation
Huwei Cyber Security PresentationPeter921148
 
Symposium AFAI Cybersecurity CSX ISACA
Symposium AFAI Cybersecurity CSX ISACASymposium AFAI Cybersecurity CSX ISACA
Symposium AFAI Cybersecurity CSX ISACAAntoine Vigneron
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Davide Cioccia
 
Accredited Forensic Courses online. Register Now
Accredited Forensic Courses online. Register NowAccredited Forensic Courses online. Register Now
Accredited Forensic Courses online. Register NowSifs India
 
Cyber handbook-enterprise-v1.6
Cyber handbook-enterprise-v1.6Cyber handbook-enterprise-v1.6
Cyber handbook-enterprise-v1.6César Celis
 
The Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookThe Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookCalvin Sam
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services OfferedRachel Anne Carter
 

Similar to Computer Hacking Forensic Investigator v9 | EC-Council (20)

Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
 
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
 
CHFI Certification
CHFI CertificationCHFI Certification
CHFI Certification
 
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
 
Brochure of ICSS
Brochure of ICSS Brochure of ICSS
Brochure of ICSS
 
Security5Security5 is an entry level certifi cation fo.docx
Security5Security5 is an entry level certifi cation fo.docxSecurity5Security5 is an entry level certifi cation fo.docx
Security5Security5 is an entry level certifi cation fo.docx
 
Video Surveillance in the Cloud?
Video Surveillance in the Cloud?  Video Surveillance in the Cloud?
Video Surveillance in the Cloud?
 
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docCyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
 
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptxTop 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptx
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
 
An Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key AgreementAn Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key Agreement
 
Huwei Cyber Security Presentation
Huwei Cyber Security PresentationHuwei Cyber Security Presentation
Huwei Cyber Security Presentation
 
Symposium AFAI Cybersecurity CSX ISACA
Symposium AFAI Cybersecurity CSX ISACASymposium AFAI Cybersecurity CSX ISACA
Symposium AFAI Cybersecurity CSX ISACA
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server
 
Accredited Forensic Courses online. Register Now
Accredited Forensic Courses online. Register NowAccredited Forensic Courses online. Register Now
Accredited Forensic Courses online. Register Now
 
Cyber handbook-enterprise-v1.6
Cyber handbook-enterprise-v1.6Cyber handbook-enterprise-v1.6
Cyber handbook-enterprise-v1.6
 
The Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookThe Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification Handbook
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 

Recently uploaded

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 

Recently uploaded (20)

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 

Computer Hacking Forensic Investigator v9 | EC-Council

  • 1. CHFI v9 01 C HFIComputer Hacking Forensic INVESTIGATOR TM Every crime leaves a trail of evidence @2017 EC-Council. All Rights Reserved. | CHFI 01/17 | www.eccouncil.org Computer Hacking Forensic Investigator v9 SECURING NETWORKS WITH FORENSIC SCIENCE
  • 2. CHFI v9 02 INTRODUCING CHFI V9: WORLD’S MOST COMPREHENSIVE COMPUTER FORENSIC CERTIFICATION PROGRAM Digital technologies are changing the face of business. As organizations rapidly embracing digital technologies such as cloud, mobile, big data and IOT, the context of digital forensics is more relevant than before. The growing number of cybercrimes has changed the role of forensics from DNA to Digital. According to the market research report published by IndustryARC, by 2020, the digital forensics market will reach 4.8 billion USD. IndustryARC also predicts that the maximum use of digital forensics is from the federal sector and this will grow from $1,097.2 million in 2015 to $2,060.5 million by 2020. The major drivers for this are increasing threats from cybercrime and terrorist attacks. Foote Partners, which tracks information technology (IT) jobs across all skill levels, projects the global demand for cyber security talent to rise to six million by 2019, with an expected shortfall of 1.5 million professionals. Over the last many years, EC-Council’s CHFI certification has gained massive traction and recognition amongst Fortune 500 enterprises globally. It has immensely benefited professionals from law enforcement, criminal investigation, defense, and security field. CHFI v9, the latest version of the program has been designed for professionals handling digital evidence while investigating cybercrimes. It is developed by an experienced panel of subject matter experts and industry specialists, and also has set global standards for computer forensics best practices. In addition, it also aims at elevating the knowledge, understanding, and skill levels of in cyber security and forensics practitioners.
  • 3. CHFI v9 03 About CHFI v9 CHFI v9 covers detailed methodological approach to computer forensic and evidence analysis. It provides the necessary skillset for identification of intruder’s footprints and gathering necessary evidence for its prosecution. All major tools and theories used by cyber forensic industry are covered in the curriculum. The certification can fortify the applied knowledge level of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, computer and network security professionals, and anyone who is concerned about the integrity of the network and digital investigations. CHFI provides necessary skills to perform effective digital forensic investigation It is a comprehensive course covering major forensic investigation scenarios that enables students to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carryout computer forensic investigation leading to prosecution of perpetrators CHFI presents a methodological approach to computer forensic including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence
  • 4. CHFI v9 04 Courseware Details Course Title: Computer Hacking Forensic Investigator (CHFI) v9 Duration: 40 hours (5 days, 9:00AM – 5:00PM) Class Format: • Instructor-led classroom – Authorized Training Center (ATC) • Live online training – iClass • Number of Questions: 150 • Passing Score: 70% • Test Duration: 4 hours • Test Format: MCQ • Test Delivery: ECC exam portal • 14 comprehensive modules and 39 labs • More than 40 percent of new labs • More than 400 new/updated tools • Classroom friendly curriculum with diagrammatic representation of concepts and examples • New and rich presentation style with eye catching graphics • Coverage of latest operating systems • Updated patch management and testing environment • Well tested, result oriented, descriptive and analytical lab manual to evaluate the presented concepts • IT/forensics professionals with basic knowledge on IT/cyber security, computer forensics, and incident response • Prior completion of CEH training would be an advantage COURSE DETAILS EXAM DETAILS WHAT’S NEW IN CHFI V9PREREQUISITES WHO SHOULD ATTEND • Anyone interested in cyber forensics/investigations • Attorneys, legal consultants, and lawyers • Law enforcement officers • Police officers • Federal/ government agents • Defense and military • Detectives/ investigators • Incident response team members • Information security managers • Network defenders • IT professionals, IT directors/ managers • System/network engineers • Security analyst/ architect/ auditors/ consultants
  • 5. CHFI v9 05 Course Outline CHFI v9 curriculum is a comprehensive course with 14 training modules covering major forensic investigation scenarios Module 1. Computer forensics in today’s world Module 8. Investigating web attacks Module 9. Database forensic Module 10. Cloud forensic Module 11. Malware forensic Module 12. Investigating email crimes Module 13. Mobile forensic Module 14. Forensics report writing and presentation Module 2. Computer forensics investigation process Module 3. Understanding hard disks and file systems Module 5. Defeating anti-forensics techniques Module 6. Operating system forensics Module 7. Network forensics Module 4. Data acquisition and duplication
  • 6. CHFI v9 06 Why CHFI • The CHFI v9 program has been redesigned and updated after thorough investigation including current market requirements, job tasks analysis, and recent industry focus on forensic skills • It is designed and developed by experienced subject matter experts and digital forensics practitioners • CHFI is a complete vendor neutral course covering all major forensics investigations technologies and solutions • CHFI has detailed labs for hands-on learning experience. On an average, approximately 50% of training time is dedicated to labs • It covers all the relevant knowledge-bases and skills to meets with regulatory compliance standards such as ISO 27001, PCI DSS, SOX, HIPPA, etc. • The student kit contains large number of white papers for additional reading • The program presents a repeatable forensics investigation methodology required from a versatile digital forensic professional which increases employability • The student kit contains several forensics investigation templates for evidence collection, chain-of- custody, final investigation reports, etc. • The program comes with cloud-based virtual labs enabling students to practice various investigation techniques in a real-time and simulated environment
  • 7. CHFI v9 07 Endorsements and Testimonials ENDORSEMENTS TESTIMONIALS NSA and CNSS: Compliant with 4012 (Senior System Managers) training standards for information security professionals in the federal government by the United States National Security Agency (NSA) and the Committee on National Security Systems (CNSS) “It is my pleasure to take the time to praise the EC-Council for having such a magnificent class, specifically THE Computer Hacking Forensic Investigator course. The course had an abundance of information, utilities, programs, and hands on experience. I am a consultant at Dell and we do have a lot of technical training, but I must comment that this one is one of the best trainings I have seen in several years. I will definitively recommend this course to all my colleagues.” — Hector Alvarez,CHFI,Enterprise & Storage Consultant, Dell Corporation,Austin,Texas “ All the treatment has been excellent, the material and the content of the course overcomes my expectations. Thanks to the instructor and to Itera for their professionalism.” — Sergio Lopez Martin,CHFI,Security Sales,IBM,Spain “ CHFI is a certification that gives an complete overview of the process that a forensic investigator must follow when is investigating a cybercrime. It includes not only the right treatment of the digital evidence in order to be accepted in the Courts but also useful tools and techniques that can be applied to investigate an incident.” —Virginia Aguilar,CHFI,KPMG,Madrid “ The Computer Hacking Forensic Investigator (CHFI) certification has been instrumental in assuring both my company and our clients that my skillset is among the elite in the cyber security and response profession. The CHFI allows my company to readily identify to our DoD clients that our team is trained to perform the rigorous functions required of cyber threat response team. Our company can now better brand our capability to investigate cyber security incidents, perform computer/malware forensic analysis, identify active threats, and report our findings.” — Brad W.Beatty,Cyber Security Analyst,Booz Allen Hamilton,USA DVA: The Department of Veterans Affairs (DVA) has included CHFI under its GI Bill for the reimbursement of test fees for veterans and other eligible persons in accordance with the provisions of PL 106-419 KOMLEK and CPS: The Malaysian Military Cyber Security Warfare Department (KOMLEK) has stipulated their military professionals to be CHFI Certified as part of their Cyber Warfare Training Program (CPS) NICF: Accepted into National Infocomm Competency Framework (NICF) infocomm professionals competency requirement list
  • 8. CHFI v9 08 About EC-Council EC-Council (International Council of E-Commerce Consultants) is one of the world's largest certification bodies for information security professionals. EC-Council is a member-based organization that certifies individuals in various information security and ebusiness skills. It has been certified by American National Standards Institute to meet its ANSI 17024 standard. It is the owner and creator of the world famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI) and EC-Council Certified Security Analyst (ECSA)/License Penetration Tester (LPT) programs, and as well as many other programs. These programs are offered in over 140 countries and have trained over 150,000 and certified more than 60,000 security professionals through a training network of over 500 training partners globally. Individuals who have achieved EC-Council certifications include those from some of the finest organizations around the world such as the US Army, the FBI, Microsoft, IBM and the United Nations. @2017 EC-Council. All Rights Reserved. | CHFI 01/17 | www.eccouncil.org