EC-Council Computer Hacking Forensic Investigator (CHFI) v8 Training

  • Overview
  • Course Content
  • Drop us a Query

EC-Council Computer Hacking Forensic Investigator (CHFI) v8 training equips the learners with the approach to handle investigation analysis for computer forensic from neutral- specific perception. This training provides hand-on practice on various investigation tools and techniques. Professionals with these skills are demanded to resolve issues regarding insider threats, corporate espionage, data breaches, and other computer related intricate cases. Attending this training enables the professionals to survive securely and defend their organization in this cyber world.

The outstanding productivity benefits of the CHFI course enable you to:

  • Understand the concept of forensic science, cybercrime, and steps in forensic investigation
  • Learn the laws involved and work accordingly to search and seize the computers with a warrant
  • List roles of first responder, evaluate electronic crime scene, conduct preliminary interviews; collect,
  • preserve and transport electronic evidence along with complete documentation
  • Define different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category
  • Setting computer forensics lab
  • Retrieve existing and deleted files from different operation systems using different processes such as
  • Access Data FTK, Encase, Steganography and other techniques
  • Crack system and application passwords
  • Perform log capturing to establish event correlation
  • Investigate network traffic, emails, and attacks
  • Practice forensic process on mobile devices with different operating systems
Target audience

CHFI training is ideal for IT professional interested in information system security covering incident response and computer forensics.


Candidates securing CEH certification can undergo CHFI training program.


CHFI Exam (312-49)

  • Computer Forensics in Today's World
  • Computer Forensics Investigation Process
  • Searching and Seizing Computers
  • Digital Evidence
  • First Responder Procedures
  • Computer Forensics Lab
  • Understanding Hard Disks and File Systems
  • Windows Forensics
  • Data Acquisition and Duplication
  • Recovering Deleted Files and Deleted Partitions
  • Forensics Investigation using AccessData FTK
  • Forensics Investigation Using EnCase
  • Steganography and Image File Forensics
  • Application Password Crackers
  • Log Capturing and Event Correlation
  • Network Forensics, Investigating Logs and Investigating Network Traffic
  • Investigating Wireless Attacks
  • Investigating Web Attacks
  • Tracking Emails and Investigating Email Crimes
  • Mobile Forensics
  • Investigative Reports
  • Becoming an Expert Witness

A Few Things You'll Love!

What our Students Speak