no script

EC-Council Computer Hacking Forensic Investigator (CHFI)

Cyber Security Training with CHFI Certification to Advance Your IT Career

EC-Council Computer Hacking Forensic Investigator (CHFI)

Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun, and the consequences can be seen in everyday life. With the onset of sophisticated cyber-attacks, the need for advanced cyber security training and investigation is a mandate in the present day.

This EC-Council Computer Hacking Forensic Investigator (CHFI) course presents a detailed methodological approach to computer forensics and evidence analysis. It is comprehensive cyber security training covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry out a computer forensic investigation.

If you or your organization requires the knowledge or skills to identify, track, and prosecute cyber criminals, then this is the course for you! This course helps students to excel in digital evidence acquisition, handling, and analysis in a forensically sound manner. Acceptable in a court of law, these skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats, and other intricate cases involving computer systems.

CHFI is a cyber security certification that gives a complete overview of the process that a forensic investigator must follow when investigating a cyber crime. It includes not only the right treatment of the digital evidence in order to be accepted in the courts but also useful tools and techniques that can be applied to investigate an incident.

To request more information or a complete syllabus for any of our IT career training programs, contact us today!

Course Prerequisites

The knowledge and skills that a student must have before attending this cyber security training are:

Don’t have the required prerequisites? Get the CompTIA Security+ and EC-Council CEH and CHFI cyber security certifications in our comprehensive Cyber Security Specialist course!

Contact us anytime to request more information or a complete syllabus.

Become a Cyber Security Specialist in 15 Days!

Get a stack of Cyber Security certifications to boost your skills and resume in one high-velocity 15-day Cyber Security Specialist training program.

Course at a Glance

BASE TRAINING PERIOD

5 Days

IT CERTIFICATION

EC-Council Computer Hacking Forensic Investigator (CHFI)

f

SKILL LEVEL

Advanced level – view prerequisites

LIVE INSTRUCTOR

This course is available at any LQ campus

VA APPROVED

This course is eligible for VA tuition benefits

ACE CREDIT

See What You'll Learn

Professional IT Career Tracks

CHFI cyber security training will benefit any individual looking for these or similar Cyber Security career paths:

  • Junior Computer Forensics Investigator
  • Incident response Technician
  • Junior Computer Security Analyst
  • Licensed Penetration Tester
  • Systems Engineer/Architect
  • Network Security Specialist
CHFI Course Objectives

Course Objectives: After completing the LeaderQuest Computer Hacking Forensic Investigator cyber security training course, you will be able to understand:

  • The process of investigating cyber-crime, laws involved, and the details in obtaining a search warrant
  • Different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category
  • Roles of the first responder, first responder toolkit, securing and evaluating the electronic crime scene, conducting preliminary interviews, documenting the electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, reporting the crime scene
  • How to recover deleted files and deleted partitions in Windows, Mac OS X, and Linux
  • The process involved in forensic investigation using Access Data FTK and Encase Steganography and its techniques, steganalysis, and image file forensics
  • Password cracking concepts, tools, types of password attacks and how to investigate password protected file breach
  • Different types of log capturing techniques, log management, time synchronization, log capturing tools
  • How to investigate logs, network traffic, wireless attacks, and web attacks
  • How to track e-mails and investigate e-mail crimes and many more
Lesson 1 & 2: Forensics Science and Computer Forensics

Course Objectives:

  • Lesson 1: Forensics Science
    • The definition of forensics science
  • Lesson 2: Computer Forensics
    • Security incident report
    • Aspects of organizational security
    • Evolution of computer forensics
    • The objective of computer forensics
    • Need for computer forensics
Lesson 3: Forensics Readiness

Course Objectives:

  • Benefits of forensics readiness
  • Goals of forensics readiness
  • Forensics readiness planning
Lesson 4: Cyber Crime

Course Objectives: 

  • Computer-facilitated crimes
  • Modes of attacks
  • Examples of cyber crime
  • Types of computer crimes
  • Cyber criminals
  • Organized cyber crime: organizational chart
  • How serious are different types of incidents?
  • Disruptive incidents to the business
  • Cost expenditure responding to the security incident
Lesson 5 -7: Cyber Crime Investigation, Corporate Investigations, & Reporting a Cyber Crime
  • Lesson 5: Cyber Crime Investigation
    • Key steps in the forensic investigation
    • Rules of forensic investigation
    • Need for a forensic investigator
    • Role of the forensic investigator
    • Accessing computer forensics resources
    • Role of digital evidence
  • Lesson 6: Corporate Investigations
    • Understanding corporate investigations
    • Approach to forensics investigation: a case study
    • Instructions for the forensic investigator to approach the crime scene
    • Why and when do you use computer forensics?
    • Enterprise Theory of Investigation (ETI)
    • Legal issues
    • Reporting the results
  • Lesson 7: Reporting a Cyber Crime
    • Why should you report cyber crime?
    • Reporting computer-related crimes
    • The person assigned to report the crime
    • When and how to report an incident?
    • Who should I contact in law enforcement?
    • Federal local agents contact
    • More contacts
    • CIO cyberthreat report form

Since I've been certified, I've gotten a job offer for every IT position I've applied for.

- Marcus Mingo

LeaderQuest Graduate, CompTIA Security+, EC-Council CEH, and CND-Certified

Job Outlook

Individuals who complete the EC-Council Computer Hacking Forensic Investigator (CHFI) training and certification qualify for the following job roles:

Junior Computer Forensics Investigator, Incident Response Technician, Junior Computer Security Analyst, Licensed Penetration Tester, Systems Engineer/Architect, Network Security Engineer, and similar roles.

  • National salary range for Network Security Engineer: $97,000 – $163,000*
clustered | amCharts

*Robert Half 2018 Technology & IT Salary Guide.

Apply Now

To learn more or apply for this program, please complete the form below and a training counselor will contact you.

  • This field is for validation purposes and should be left unchanged.

Financing Options

FEDERAL FINANCIAL AID PROGRAMS FOR IT AND CYBER SECURITY TRAINING

Workforce Innovation and Opportunity Act (WIOA) Adult and Dislocated Worker Program:
This program provides government funding for employment and training services. WIOA aids eligible adults and dislocated workers in both finding and qualifying for meaningful employment.

Trade Adjustment Assistance (TAA):
TAA is a federally funded employment program. It provides benefits to workers who lose their jobs or had their hours reduced as a result of foreign trade. Benefits may include training, job search allowances, relocation allowances, and other reemployment services.

MILITARY EDUCATION BENEFITS

Post 9/11 G.I. Bill Education Program:
The Post 9/11 G.I. Bill is an education benefit program for Active Duty, Selected Reserve, and National Guard service members who served on active duty after September 10, 2001.

Veterans Workforce Investment Program (VWIP):
VWIP provides resources for the training necessary to prepare eligible veterans for meaningful employment within the labor force.

The Vocational Rehabilitation and Employment (VR&E) VetSuccess Program:
The VR&E VetSuccess program, also known as Voc-Rehab or Chapter 31, offers disabled vets counseling, training, education and other services needed to prepare for, find, and keep suitable jobs.

Military Spouse Career Advancement Accounts (MyCAA):
MyCAA provides up to $4,000 (over 2 years) of Financial Assistance for military spouses who are pursuing degree programs, licenses or credentials leading to employment in portable career fields.

PRIVATE TRAINING LOAN OPTIONS

LeaderQuest has partnered with Climb Credit! Climb Credit offers tuition financing at fixed interest rates starting at 5%. They offer high approvals and low monthly payments. Climb’s online application takes minutes to complete with instant pre-approval. Apply with a qualifying co-borrower for the best rates.

Approved and available funding programs vary by location. Visit www.climbcredit.com/leaderquest for complete details and eligibility requirements.