Cyber Security Category Banner Image

EC-Council Computer Hacking Forensic Investigator

  • Length 5 days
  • Price  NZD 5115 exc GST
  • Version 10
  • Inclusions Exam voucher
Course overview
View dates &
book now
Course locations >>

Why study this course

Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.

CHFI v10 includes all the essentials of digital forensics analysis and evaluation required for today’s digital world. From identifying the footprints of a breach to collecting evidence for a prosecution, CHFI v10 walks students through every step of the process with experiential learning. This course has been tested and approved by veterans and top practitioners of the cyber forensics industry.

CHFI v10 is engineered by industry practitioners for both professionals and aspiring professionals alike from careers including forensic analysts, cybercrime investigators, cyber defence forensic analysts, incident responders, information technology auditors, malware analysts, security consultants, and chief security officers.

Request Course Information


What you’ll learn

  • Forensic Science

  • Regulations, Policies and Ethics

  • Digital Evidence

  • Procedures and Methodology

  • Digital Forensics

  • Tools/Systems/Programs


EC-Council ATC Shield Logo

EC-Council at Lumify Work

The International Council of E-Commerce Consultants (EC-Council) is a member-based organisation that certifies individuals in various e-business and information security skills. It is the owner and creator of the world famous Certified Ethical Hacker (CEH), Computer Hacking Forensic Investigator (CHFI), EC-Council Certified Security Analyst (ECSA) and Licensed Penetration Tester (LPT) certifications and cyber security courses. Lumify Work is the partner of choice for EC-Council in Australia.


Who is the course for?

The CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident response, including:

  • Police and other law enforcement personnel

  • Defence and Security personnel

  • e-Business Security professionals

  • Legal professionals

  • Banking, Insurance, and other professionals

  • Government agencies

  • IT managers

  • Digital Forensics Service Providers


Course subjects

Module 1: Computer Forensics in Today’s World

  • Understand the Fundamentals of Computer Forensics

  • Understand Cybercrimes and their Investigation Procedures

  • Understand Digital Evidence

  • Understand Forensic Readiness, Incident Response and the Role of SOC (Security

  • Identify the Roles and Responsibilities of a Forensic Investigator

  • Understand the Challenges Faced in Investigating Cybercrimes

  • Understand Legal Compliance in Computer Forensics

Module 2: Computer Forensics Investigation Process

  • Understand the Forensic Investigation Process and its Importance

  • Understand the Pre-investigation Phase

  • Understand First Response

  • Understand the Post-investigation Phase

Module 3: Understanding Hard Disks and File Systems

  • Describe Different Types of Disk Drives and their Characteristics

  • Explain the Logical Structure of a Disk

  • Understand Booting Process of Windows, Linux and Mac Operating Systems

  • Understand Various File Systems of Windows, Linux and Mac Operating Systems

  • Examine File System Using Autopsy and The Sleuth Kit Tools

  • Understand Storage Systems

  • Understand Encoding Standards and Hex Editors

  • Analyse Popular File Formats Using Hex Editor

Module 4: Data Acquisition and Duplication

  • Understand Data Acquisition Fundamentals

  • Understand Data Acquisition Methodology

  • Prepare an Image File for Examination

Module 5: Defeating Anti-Forensics Techniques

  • Understand Anti-Forensics Techniques

  • Discuss Data Deletion and Recycle Bin Forensics

  • Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions

  • Explore Password Cracking/Bypassing Techniques

  • Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch

  • Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption

  • Detect Program Packers and Footprint Minimising Techniques

  • Understand Anti-Forensics Countermeasures

Module 6: Windows Forensics

  • Collect Volatile and Non-volatile Information

  • Perform Windows Memory and Registry Analysis

  • Examine the Cache, Cookie and History Recorded in Web Browsers

  • Examine Windows Files and Metadata

  • Understand Text-based Logs and Windows Event Logs

Module 7: Linux and Mac Forensics

  • Understand Volatile and Non-volatile Data in Linux

  • Analyse Filesystem Images Using the Sleuth Kit

  • Demonstrate Memory Forensics Using Volatility and PhotoRec

  • Understand Mac Forensics

Module 8: Network Forensics

  • Understand Network Forensics

  • Explain Logging Fundamentals and Network Forensic Readiness

  • Summarise Event Correlation Concepts

  • Identify Indicators of Compromise (IoCs) from Network Logs

  • Investigate Network Traffic

  • Perform Incident Detection and Examination with SIEM Tools

  • Monitor and Detect Wireless Network Attacks

Module 9: Investigating Web Attacks

  • Understand Web Application Forensics

  • Understand Internet Information Services (IIS) Logs

  • Understand Apache Web Server Logs

  • Understand the Functionality of Intrusion Detection System (IDS)

  • Understand the Functionality of Web Application Firewall (WAF)

  • Analysing ModSecurity Audit Logs

  • Investigate Web Attacks on Windows-based Servers

  • Detect and Investigate Various Attacks on Web Applications

Module 10: Dark Web Forensics

  • Understand the Dark Web

  • Determine How to Identify the Traces of Tor Browser during Investigation

  • Perform Tor Browser Forensics

Module 11: Database Forensics

  • Understand Database Forensics and its Importance

  • Determine Data Storage and Database Evidence Repositories in MSSQL Server

  • Collect Evidence Files on MSSQL Server

  • Perform MSSQL Forensics

  • Understand Internal Architecture of MySQL® and Structure of Data Directory

  • Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis

  • Perform MySQL Forensics on WordPress Web Application Database

Module 12: Cloud Forensics

  • Understand the Basic Cloud Computing Concepts

  • Understand Cloud Forensics

  • Understand the Fundamentals of Amazon Web Services (AWS)

  • Determine How to Investigate Security Incidents in AWS

  • Understand the Fundamentals of Microsoft Azure

  • Determine How to Investigate Security Incidents in Azure

  • Understand Forensic Methodologies for Containers and Microservices

Module 13: Investigating Email Crimes

  • Understand Email Basics

  • Understand Email Crime Investigation and its Steps

  • U.S. Laws Against Email Crime

Module 14: Malware Forensics

  • Define Malware and Identify the Common Techniques Attackers Use to Spread

  • Understand Malware Forensics Fundamentals and Recognise Types of Malware Analysis

  • Understand and Perform Static Analysis of Malware

  • Analyse Suspicious Word and PDF Documents

  • Understand Dynamic Malware Analysis Fundamentals and Approaches

  • Analyse Malware Behaviour on System Properties in Real-time

  • Analyse Malware Behaviour on Network in Real-time

  • Describe Fileless Malware Attacks and How they Happen

  • Perform Fileless Malware Analysis – Emotet

Module 15: Mobile Forensics

  • Understand the Importance of Mobile Device Forensics

  • Illustrate Architectural Layers and Boot Processes of Android and iOS Devices

  • Explain the Steps Involved in Mobile Forensics Process

  • Investigate Cellular Network Data

  • Understand SIM File System and its Data Acquisition Method

  • Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices

  • Perform Logical Acquisition on Android and iOS Devices

  • Perform Physical Acquisition on Android and iOS Devices

  • Discuss Mobile Forensics Challenges and Prepare Investigation Report

Module 16: IoT Forensics

  • Understand IoT and IoT Security Problems

  • Recognise Different Types of IoT Threats

  • Understand IoT Forensics

  • Perform Forensics on IoT Devices


Prerequisites

IT and forensics professionals with basic knowledge of IT/cybersecurity, computer forensics, and incident response. Knowledge of Threat Vectors.


Terms & Conditions

The supply of this course by Lumify Work is governed by the booking terms and conditions. Please read the terms and conditions carefully before enrolling in this course, as enrolment in the course is conditional on acceptance of these terms and conditions.


Request Course Information

Awaiting course schedule

If you would like to receive a notification when this course becomes available, enter your details below.

Personalise your schedule with Lumify USchedule

Interested in a course that we have not yet scheduled? Get in touch, and ask for your preferred date and time. We can work together to make it happen.



Loading