Course Overview
Our 5-day, instructor-led CHFI (Computer Hacking Forensic Investigator) training and certification boot camp in Washington, DC Metro, Tysons Corner, VA, Columbia, MD or Live Online is geared toward IT security professionals in police and law enforcement, military and government, banking, network, and e-business. It will teach you how to:
- Detect different types of attacks
- Differentiate between various types of digital evidence
- Gather evidence to prosecute cyber criminals
- Secure a network & prevent an intrusion
- Recover lost & deleted files
- Track & investigate emails, logs, network traffic, wireless attacks & web attacks
This course will fully prepare you for the CHFI Certification exam.
You should be familiar with Windows-based computer systems before taking this course.
Schedule
CHFI Certification Training
date
location
3/15/21 - 3/19/21 (5 days)
8:30AM - 4:30PM EST
Online
Open3/15/21 - 3/19/21 (5 days)
8:30AM - 4:30PM EST
Columbia, MD
Open5/03/21 - 5/07/21 (5 days)
8:30AM - 4:30PM EST
Tysons Corner, VA
Open5/10/21 - 5/14/21 (5 days)
8:30AM - 4:30PM EST
Columbia, MD
Open5/10/21 - 5/14/21 (5 days)
8:30AM - 4:30PM EST
Online
Open6/07/21 - 6/11/21 (5 days)
8:30AM - 4:00PM GMT+!
Stuttgart, Germany
Sold Out7/05/21 - 7/09/21 (5 days)
8:30AM - 4:30PM EST
Tysons Corner, VA
Open7/12/21 - 7/16/21 (5 days)
8:30AM - 4:30PM EST
Online
Open7/12/21 - 7/16/21 (5 days)
8:30AM - 4:30PM EST
Columbia, MD
Open9/13/21 - 9/17/21 (5 days)
8:30AM - 4:30PM EST
Tysons Corner, VA
Open9/20/21 - 9/24/21 (5 days)
8:30AM - 4:30PM EST
Online
Open9/20/21 - 9/24/21 (5 days)
8:30AM - 4:30PM EST
Columbia, MD
Open11/01/21 - 11/05/21 (5 days)
8:30AM - 4:30PM EST
Tysons Corner, VA
Open11/08/21 - 11/12/21 (5 days)
8:30AM - 4:30PM EST
Online
Open11/08/21 - 11/12/21 (5 days)
8:30AM - 4:30PM EST
Columbia, MD
Open1/24/22 - 1/28/22 (5 days)
8:30AM - 4:30PM EST
Tysons Corner, VA
Open1/31/22 - 2/04/22 (5 days)
8:30AM - 4:30PM EST
Online
Open1/31/22 - 2/04/22 (5 days)
8:30AM - 4:30PM EST
Columbia, MD
Open3/28/22 - 4/01/22 (5 days)
8:30AM - 4:30PM EST
Tysons Corner, VA
Open4/04/22 - 4/08/22 (5 days)
8:30AM - 4:30PM EST
Online
Open4/04/22 - 4/08/22 (5 days)
8:30AM - 4:30PM EST
Columbia, MD
Open5/23/22 - 5/27/22 (5 days)
8:30AM - 4:30PM EST
Tysons Corner, VA
Open6/06/22 - 6/10/22 (5 days)
8:30AM - 4:30PM EST
Online
Open6/06/22 - 6/10/22 (5 days)
8:30AM - 4:30PM EST
Columbia, MD
Open7/25/22 - 7/29/22 (5 days)
8:30AM - 4:30PM EST
Tysons Corner, VA
Open8/01/22 - 8/05/22 (5 days)
8:30AM - 4:30PM EST
Online
Open8/01/22 - 8/05/22 (5 days)
8:30AM - 4:30PM EST
Columbia, MD
Open9/26/22 - 9/30/22 (5 days)
8:30AM - 4:30PM EST
Tysons Corner, VA
Open10/03/22 - 10/07/22 (5 days)
8:30AM - 4:30PM EST
Online
Open10/03/22 - 10/07/22 (5 days)
8:30AM - 4:30PM EST
Columbia, MD
Open11/28/22 - 12/02/22 (5 days)
8:30AM - 4:30PM EST
Tysons Corner, VA
Open12/05/22 - 12/09/22 (5 days)
8:30AM - 4:30PM EST
Online
Open12/05/22 - 12/09/22 (5 days)
8:30AM - 4:30PM EST
Columbia, MD
Open![[image]](https://phoenixts.com/wp-content/themes/phoenixts-com/assets/images/temp/image-9@2x.jpg)
Not seeing a good fit?
Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.
Learn more about custom training
Course Outline
Computer Forensics in Today’s World
- Understanding computer forensics
- Why and when do you use computer forensics?
- Cyber crime (types of computer crimes)
- Case study
- Challenges cyber crimes present for investigators
- Cyber crime investigation
- Rules of forensics investigation
- Understanding digital evidence
- Types of digital evidence
- Characteristics of digital evidence
- Role of digital evidence
- Sources of potential evidence
- Rules of evidence
- Forensics readiness
- Computer forensics as part of an incident response plan
- Need for forensic investigator
- Roles and responsibilities of forensics investigator
- What makes a goof computer forensics investigator?
- Investigative challenges
- Legal and privacy issues
- Code of ethics
- Accessing computer forensics resources
Computer Forensics Investigation Process
- Importance of computer forensics process
- Phases involved in the computer forensics investigation process
- Pre-investigation phase
- Investigation phase
- Post-investigation phase
Understanding Hard Disks and File Systems
- Hard disk drive overview
- Disk partitions and boot process
- Understanding file systems
- RAID storage system
- File system analysis
Data Acquisition and Duplication
- Data acquisition and duplication concepts
- Static acquisition
- Validate data acquisitions
- Acquisition best practices
Defeating Anti-Forensics Techniques
- What is anti-forensics?
- Anti-forensics techniques
Operating System Forensics (Windows, Mac, Linux)
- Introduction to OS forensics
- Windows forensics
- Linux forensics
- MAC forensics
Network Forensics
- Introduction to network forensics
- Fundamental logging concepts
- Event correlation concepts
- Network forensic readiness
- Network forensics steps
- Network traffic investigation
- Documenting the evidence
- Evidence reconstruction
Investigating Web Attacks
- Introduction to web application forensics
- Web attack investigation
- Investigating web server logs
- Web attack detection tools
- Tools for locating IP Address
- WHOIS lookup tools
Database Forensics
- Database forensics and its importance
- MSSQL forensics
- MySQL forensics
Cloud Forensics
- Introduction to cloud computing
- Cloud forensics
Malware Forensics
- Introduction to malware
- Introduction to malware forensics
Investigating Email Crimes
- Email system
- Email crimes (email spamming, mail bombing/mail storm, phishing, email spoofing, crime via chat room, identity fraud/chain letter)
- Email message
- Steps to investigate email crimes and violation
- Email forensics tools
- Laws and acts against email crimes
Mobile Phone Forensics
- Mobile device forensics
Forensics Report Writing and Persuasion
- Writing investigation reports
- Expert witness testimony
Exam Information
CHFI Certification Training Course Details:
- Number of Questions: 150
- Passing Score: 70%
- Duration: 4 hours
- Format: multiple choice
- Delivery: Prometric/Pearson VUE
- Code: 312-49
CHFI Certification Exam Objectives:
The CHFI certification exam tests candidates on these twenty-two domains:
- Computer Forensics in Today’s World
- Computer Forensics Investigation Process Searching and Seizing Computers
- Digital Evidence
- First Responder Procedures
- Computer Forensics Lab
- Understanding Hard Disks and File Systems
- Windows Forensics
- Data Acquisition and Duplication
- Recovering Deleted Files and Deleted Partitions
- Forensics Investigation with AccessData FTK
- Forensics Investigation with EnCase
- Steganography and Image File Forensics
- Application Password Crackers
- Log Capturing and Event Correlation
- Network Forensics, Investigating Logs and Network Traffic
- Investigation Wireless Attacks
- Investigating Web Attacks
- Tracking Emails and Investigation Email Crimes
- Mobile Forensics
- Investigative REports
- Becoming and Expert Witness
Phoenix TS is an authorized testing center for Prometric and Pearson VUE exams. Register for exams by calling us at (240) 667-7757 or visiting the Pearson VUE and Prometric websites.
CHFI Certification Training Resources
-
Blog Post
Learn How to Make Your Dream Business a Reality
-
Blog Post
The FYI ABOUT PMP from PMI
-
Blog Post
STRENGTHEN YOUR CYBERCORE!
-
Blog Post
Security + Changes!
-
Blog Post
What’s the 411 with the updated CySA+?
-
Blog Post
How to Maintain Team Building While Working Remotely!
-
Blog Post
All About the CISSP
-
Blog Post
Get CCNA-ready in 2020!
-
Blog Post
IT Project Managers, a career of keeping business IT on track!
-
Blog Post
Jira – The Godzilla of Team Support Tools!
-
Blog Post
What’s All the Buzz Around Microsoft Azure?
-
Blog Post
Get the E-Book!
-
Blog Post
The Adobe Connect Way!
-
Blog Post
Train, Test and Certify From Home!
-
Blog Post
Critical Thinking in the Workplace
-
Blog Post
Are you Teleworking Now? Watch out. Cybersecurity risks are everywhere!
-
Blog Post
Everything you wanted to know about the Security+ SY0-601 but were afraid to ask!
-
Blog Post
Hey Remote Worker! You Better be Using Email Best Practices
-
Blog Post
Head in the Cloud? Time to Face Cyber Security Reality
-
Blog Post
Companies use COVID-19 Downtime to Educate their Workforce Online
-
Resource
EC-Council CHFI Assessment
-
Blog Post
EC-Council Cyber Security Programs Guide
-
Blog Post
Phoenix TS is an EC-Council Circle of Excellence Winner Again!