CHFI Computer Hacking Forensic Investigator v11 Training – Cybersecurity

CHFI Computer Hacking Forensic Investigator training course, CHFI Computer Hacking Forensic Investigator certification exam, CHFI Computer Hacking Forensic Investigator live online training, CHFI Computer Hacking Forensic Investigator online, CHFI Portugal, Hacking forensic Portugal

Mastering the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits.

 


Next DATES       04-Nov-2024,   Register now       17-Feb-2025,   Register now       


course evaluation     4.8 in 5

CHFI Computer Hacking Forensic Investigator training course, CHFI Computer Hacking Forensic Investigator certification exam, CHFI Computer Hacking Forensic Investigator live online training, CHFI Computer Hacking Forensic Investigator online, CHFI Portugal, Hacking forensic Portugal

Introduction
This course is available to be delivered in a classroom and Live-Training model.
Live Training brings you the dynamic environment of the classroom, to your desk. Using your computer, you interact with the trainer and the trainees as if you were with them in the classroom.

Click to learn how > Live Online Training works < CHFI Path

CHFI is a comprehensive course covering major forensic investigation scenarios that enables students to acquire necessary hands-on experience regarding various forensic investigation techniques. Learn how to utilize standard forensic tools to successfully carryout a computer forensic investigation which can better prepare you to aid in the prosecution of perpetrators.

Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and the consequences can be seen in every day life. With the onset of sophisticated cyber-attacks, the need for advanced cyber security and investigation training is a mandate in the present day. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminals, then this is the course for you. This course helps students to excel in digital evidence acquisition, handling and analysis in a forensically sound manner. Acceptable in a court of law, these skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats and other intricate cases involving computer systems.

Training Methodology
EC-Council releases the most advanced Computer Forensic Investigation program in the world. CHFIv8 presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.

Audience
The CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident response.

Prerequisites
It is strongly recommended that you attend the CEH class before enrolling into CHFI program.
Your own laptop is required - bring your laptop to training.

Duration (days)
5 days

Learning Objectives
At the end of the course students should be able to:
  • Computer forensics fundamentals, different types of cybercrimes and their investigation procedures, and regulations and standards that influence computer forensics investigation
  • Various phases involved in the computer forensics investigation process
  • Different types of disk drives and their characteristics, booting process and file systems in Windows, Linux, and Mac operating systems, file system examination tools, RAID and NAS/SAN storage systems, various encoding standards, and file format analysis
  • Data acquisition fundamentals and methodology, eDiscovery, and how to prepare image files for forensics examination
  • Various anti-forensics techniques used by attackers, different ways to detect them and related tools, and countermeasures
  • Volatile and non-volatile data acquisition in Windows-based operating systems, Windows memory and registry analysis, electron application analysis, web browser forensics, and examination of Windows files, ShellBags, LNK files, jump lists, and Windows event logs
  • Volatile and non-volatile data acquisition and memory forensics in Linux and Mac operating systems
  • Network forensics fundamentals, event correlation concepts, Indicators of Compromise (IOCs) and ways to identify them from network logs, techniques and tools related to network traffic investigation, incident detection and examination, and wireless attack detection and investigation
  • Malware forensics concepts, static and dynamic malware analysis, system and network behavior analysis, and ransomware analysis
  • Web application forensics and challenges, web application threats and attacks, web application logs (IIS logs, Apache web server logs, etc.), and how to detect and investigate various web application attacks
  • Tor browser working methodology and steps involved in the Tor browser forensics process
  • Cloud computing concepts, cloud forensics and challenges, fundamentals of AWS, Microsoft Azure, and Google Cloud and their investigation processes
  • Components in email communication, steps involved in email crime investigation, and social media forensics
  • Architectural layers and boot processes of Android and iOS devices, mobile forensics process, various cellular networks, SIM file system, and logical and physical acquisition of Android and iOS devices
  • Different types of IoT threats, security problems, vulnerabilities and attack surfaces areas, and IoT forensics processes and challenges

Program
  1. Computer Forensics in Today's World
  2. Computer Forensic Investigation Process
  3. Understanding Hard Disks and File Systems
  4. Data Acquisition and Duplication
  5. Defeating Anti-Forensics Techniques
  6. Windows Forensics
  7. Linux and Mac Forensics
  8. Network Forensics
  9. Investigating Web Attacks
  10. Dark Web Forensics
  11. Cloud Forensics
  12. Email and Social Media Forensics
  13. Mobile Forensics
  14. IoT Forensics

Exam
The CHFI 312-49 - Computer Hacking Forensic Investigator (CHFI) - EC-Council exam will be conducted on the last day of training
Number of Questions: 150
Passing Score: 70%
Test Duration: 4 hours
Test Format: Multiple choice

Certification
CHFI Program certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The C|HFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.

The CHFI 312-49 exam will be conducted on the last day of training.

Trainer
Trainer certified by EC-COUNCIL.

General Information
  • Training in Portuguese and English language.
  • Online training material in English, with online access for 1 year.
  • Hands on Labs - environment that simulates a real time information infrastructure. The iLabs is a subscription based service that allows students to log on to a virtualized remote machine running Windows Server to perform various exercises featured in the CHFI Lab Guide. All you need is a web browser to connect and start experimenting. The virtual machine setup reduces the time and effort spent by instructors and partners prior to the classroom engagement. It is a hassle free service available 24/7 x number of days subscribed.
  • Digital Behaviour Participation Certificate with 40 CPD/CPE credits.
  • EC-COUNCIL Certificate.
  • EC-COUNCIL Exam. You can schedule the exam within 11 months after training. The exam is available online.

Benefits

Dates and Price

Click on “Price and Registration” to access more information and also the price:

Guaranteed Dates Program
(*) All dates of this course are guaranteed only for the events that take place in Lisbon. In other locations the events are subject to a minimum number of participants. On Behaviour all courses at Lisbon occur regardless of the number of trainees in room. The concept of setting up classes does not exist in our educational model, which is why all public dates, presented on the website, are guaranteed. So if you're in Portugal or anywhere else in the world, you can prepare your week and your trip, as long as you ensure your registration in the course.

Volume Discounts
For companies, Behaviour offer discounts, starting from the registration of the 2nd participant, in the same course and on the same date. Simulate the prices for the number of participants you want to training@behaviour-group.com or contact us via chat.

Hotels and Useful Information
Know where you can stay in Lisbon, near Behaviour. For more information please see >> Booking <<