SEC-CHFI - Computer Hacking Forensic Investigator (CHFI) Boot Camp v8

Duration: 5 days

Price: $2,995.00

Unitek Training teaches the most advanced Computer Forensic Investigation course in the world. CHFIv8 presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.

Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and the consequences can be seen in every day life. With the onset of sophisticated cyber-attacks, the need for advanced cyber security and investigation training is a mandate in the present day. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminals, then this is the course for you. This course helps students to excel in digital evidence acquisition, handling and analysis in a forensically sound manner. Acceptable in a court of law, these skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats and other intricate cases involving computer systems.

This course prepares you for the following exams:

Upcoming Classes

To schedule a class, please contact us at 888-825-6273

Course Outline

Module 1: Computer Forensics in Today's World

Module 2: Computer Forensics Investigation Process

Module 3: Searching and Seizing Computers

Module 4: Digital Evidence

Module 5: First Responder Procedures

Module 6: Computer Forensics Lab

Module 7: Understanding Hard Disks and File Systems

Module 8: Windows Forensics

Module 9: Data Acquisition and Duplication

Module 10: Recovering Deleted Files and Deleted Partitions

Module 11: Forensics Investigation using AccessData FTK

Module 12: Forensics Investigation Using EnCase

Module 13: Steganography and Image File Forensics

Module 14: Application Password Crackers

Module 15: Log Capturing and Event Correlation

Module 16: Network Forensics, Investigating Logs and Investigating Network Traffic

Module 17: Investigating Wireless Attacks

Module 18: Investigating Web Attacks

Module 19: Tracking Emails and Investigating Email Crimes

Module 20: Mobile Forensics

Module 21: Investigative Reports

Module 22: Becoming an Expert Witness