CHFI v10 includes all the essentials of digital forensics analysis and evaluation required for today’s digital world. From identifying the footprints of a breach to collecting evidence for a prosecution, CHFI v10 walks students through every step of the process with experiential learning.
CHFI v10 is engineered by industry practitioners for both professionals and aspiring professionals.
How You Will Benefit
Certified Hacking Forensic Investigator v10 has been designed by industry experts to provide an unbiased approach to applying complex investigation practices, empowering Forensic Professionals to:
•Play an active role in investigating and preserving digital and non-digital evidence of an attack.
•Counter to the series of compromises.
•Use threat intelligence to anticipate and alert cyber teams in case of future attacks.
Who should attend?
The CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident response.
Target Audience
•Police and other law enforcement personnel
•Defense and Security personnel
•e-Business Security professionals
•Legal professionals
•Banking, Insurance, and other professionals
•Government agencies
•IT managers
Exam Syllabus Topics:
Forensic Science
•Understand different types of cybercrimes and list various forensic investigations challenges
•Understand the fundamentals of computer forensics and determine the roles and responsibilities of forensic investigators
•Understand data acquisition concepts and rules
•Understand the fundamental concepts and working of databases, cloud computing, Emails, IOT, Malware (file and fileless), and dark web
Regulations, Policies and Ethics
•Understand rules and regulations pertaining to search & seizure of the evidence, and evidence examination
•Understand different laws and legal issues that impact forensic investigations
Digital Evidence
•Understand the fundamental characteristics and types of digital evidence
•Understand the fundamental concepts and working of desktop and mobile Operating Systems
•Understand different types of logs and their importance in forensic investigations
•Understand various encoding standards and analyze various file types
•Understand the fundamental working of WAF and MySQL Database
Procedures and Methodology
•Understand Forensic Investigation Process
•Understand the methodology to acquire data from different types of evidence
•Illustrate Image/Evidence Examination and Event Correlation
•Explain Dark Web and Malware Forensics
Digital Forensics
•Review Various Anti-Forensic Techniques and Ways to Defeat Them
•Analyze Various Files Associated with Windows and Linux and Android Devices
•Analyze various logs and perform network forensics to investigate network attacks
•Analyze Various Logs and Perform Web Application Forensics to Examine Various Web Based Attacks
•Perform Forensics on Databases, Dark Web, Emails, Cloud and IoT devices
•Perform Static and Dynamic Malware Analysis in a Sandboxed Environment
•Analyze Malware Behavior on System and Network Level, and Analyze Fileless Malware
Tools/Systems/ Programs
•Identify various tools to investigate Operating Systems including Windows, Linux, Mac, Android and iOS
•Determine the various tools to investigate MSSQL, MySQL, Azure, AWS, Emails and IoT devices
Learn Python like a Professional Start from the basics and go all the way to creating your own applications and games
4.6
★★★★★ 4.6/5
1,474,038 students