Computer Hacking Forensics Investigator Version 8 (CHFIv8)
Cybercrime is the most serious threat to the presence of individuals, corporations, and governments on the Internet. Are ready to combat against it?
The release of EC-Council's Computer Hacking Forensic Investigator version 8 (CHFIv8) certified training program presents a detailed and methodological approach to computer forensics and evidence analysis. Loaded with over 200 hands-on labs and 500 cutting-edge tools, the new version 8 consists of the most advanced forensics techniques used in the cyber world.
This improved skill set will prepare IT professionals to meet the toughest challenges in fighting cybercrime. If you requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the program for you.
EC-Council releases the most advanced Computer Hacking Forensic Investigator program in the world. CHFIv8 presents detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enables students to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carryout a computer forensic investigation leading to prosecution of perpetrators. Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and we can also see the consequences in our daily lives. With the onset of sophisticated cyber-attacks, the need for advanced cyber security and investigation training is a mandate in present day. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cyber criminal, then this is the course for you. This course helps forensic investigators to excel in incident handling and investigate various types of security incidents such as data breaches, latest persistent security issues, insider employee threats and intricate digital forensic circumstances and cases.
Who Should Attend
Police and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies, IT managers
5 days (9:00 – 5:00)
The CHFI 312-49 exam will be conducted on the last day of training. Students need to pass the online Prometric exam to receive the CHFI v8 certification.
CHFIv8 Curriculum Consists Of 22 Instructor-led Training Modules:
1. Computer Forensics in Today’s World
2. Computer Forensics Investigation Process
3. Searching and Seizing Computers
4. Digital Evidence
5. First Responder Procedures
6. Computer Forensics Lab
7. Understanding Hard Disks and File Systems
8. Windows Forensics
9. Data Acquisition and Duplication
10. Recovering Deleted Files and Partitions
11. Forensics Investigation Using Access Data FTK
12. Forensics Investigation Using Encase
13. Steganography and Image File Forensics
14. Application Password Crackers
15. Log Capturing and Event Correlation
16. Network Forensics, Investigating Logs
17. Investigating Wireless Attacks
18. Investigating Web Attacks
19. Tracking Emails and Investigating Email Crimes
20. Mobile Forensics
21. Investigative Reports
22. Becoming an Expert Witness
Key Features Of CHFI v8:
CHFI v8 contains updated content on rapidly evolving investigation techniques.
The well-designed content enhances the learning experience and ensures better understanding of key concepts and investigation methodologies.
The well-structured slides create an interactive classroom environment.
The slides contain diagrams and illustrations to create better understanding of investigation process and actual attack paths.
New Investigation Techniques
CHFI v8 provides in-depth knowledge of new techniques and tools used in forensic investigation to meet the toughest challenges in cybercrime.
CHFI v8 showcases hundreds of investigation tools including EnCase, Access Data FTK, and ProDiscover.
Sample Evidence Files
CHFI v8 DVD contains a huge cache of evidence files for analysis including RAW, .dd images, video and audio files, MS Office files, systems files etc.
Eye-catching graphics complement the content and enhance the learning experience of the students.
Lab setup manual provides detailed procedures to setup a lab environment complete with network environment, evidence files and other prerequisite tools.
CHFIv8 also provides a DVD-ROM with a repository of around 8 GB of latest investigation tools and security tools.