SlideShare a Scribd company logo
Computer Hacking
Forensic Investigator
(CHFI)
Introduction
E
C-Council
Introductions
~ Name
~ Company Affiliation
~ Title / Function
~ Job Responsibility
~ System security related experience
~Expectations
E
C-Council
Course Materials
~ Identity Card
~ Student Courseware
~ Lab Manual/ Workbook
~ CHFI Lab Files
~ Knoppix CD-ROM
~ Course Evaluation
~ Reference Materials
E
C-Council
Course Outline
~ Module I: Computer Forensics in Today’s World
~ Module II: Law And Computer Forensics
~ Module III: Computer Investigation Process
~ Module IV: Computer Security Incident Response
Team
~ Module V: Computer Forensic Laboratory
Requirements
~ Module VI: Understanding File systems and Hard
disks
~ Module VII: Windows Forensics
E
C-Council
Course Outline (contd.)
~ Module VIII: Linux and Macintosh Boot processes
~ Module IX: Linux Forensics
~ Module XX: Data Acquisition and Duplication
~ Module XI: Recovering Deleted Files
~ Module XII: Image Files Forensics
~ Module XIII: Steganography
~ Module XIV: Computer Forensic Tools
E
C-Council
Course Outline (contd.)
~ Module XV: Application password crackers
~ Module XVI: Investigating Logs
~ Module XVII: Investigating network traffic
~ Module XVIII: Router Forensics
~ Module XIX: Investigating Web Attacks
~ Module XX: Tracking E-mails and Investigating E-
mail crimes
E
C-Council
Course Outline (contd.)
~ Module XXI: Mobile and PDA Forensics
~ Module XXII: Investigating Trademark and
Copyright Infringement
~ Module XXIII: Investigative Reports
~ Module XIV: Becoming an Expert Witness
~ Module XXV: Forensics in action
E
C-Council
E
C-Council Certified e- business
Certification Program
There are several levels of certification tracks under E
C-Council Accreditation
body:
1. Certified e-Business Associate
2. Certified e-Business Professional
3. Certified e-Business Consultant
4. E++ Certified Technical Consultant
5. Certified Ethical Hacker (CEH)
6 . Com puter Hacking Forensic Investigator (CHFI) Å You a re here
7. EC-Council Certified Security Analyst (ECSA)
8. EC-Council Certified Secure Programmer (ECSA)
9. Certified Secure Application Developer (CSAD)
10. Licensed Penetration Tester (LPT)
11. Master of Security Science (MSS)
E
C-Council
E
C-Council CHFI Exam
E
C-Council
Student Facilities
Building Hours Phones
Parking Messages
Restrooms Smoking
Recycling
Meals
Class Hours
E
C-Council
Lab Sessions
~ Lab Sessions are designed
to reinforce the classroom
sessions
~ The sessions are intended
to give a hands on
experience only and does
not guarantee proficiency.

More Related Content

PDF
PDF
Computer Aided Verification 22nd International Conference Cav 2010 Edinburgh ...
PDF
Ceh v5 module 00 student introduction
PDF
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
PDF
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
DOCX
digital forensic.docx
PDF
EC-Council Certification Roadmap and Course Catalog
PDF
File000113
Computer Aided Verification 22nd International Conference Cav 2010 Edinburgh ...
Ceh v5 module 00 student introduction
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
digital forensic.docx
EC-Council Certification Roadmap and Course Catalog
File000113

Similar to Computer_Hacking_Forensic_Investigator_C.pdf (20)

PDF
Cyber handbook enterprise v1.6
PDF
Cyber-Handbook-Enterprise.pdf
PDF
Computer Hacking Forensic Investigator v9 | EC-Council
PDF
EC-Council Computer Hacking Forensic Investigator v9
PPTX
cyber forensic courses in kerala | Enroll now
PDF
Networking Icn 2005 4th International Conference On Networking Reunion Island...
PDF
EC-Council-Cyber-Handbook-Enterprise-2024.pdf
DOCX
CC 101 Introduction to Computing/Intro Comp
PDF
Cyber handbook-enterprise-v1.6
PPTX
International Onshore Oct 2010
PDF
Syllabus T.Y.Bsc. I.T. (SEM V & SEM VI)
PDF
4.129 tybsc it
PDF
ScadaLab Project
PDF
Pengenalan Forensik Digital
PDF
Cyber security course in kerala | C|HFI | Blitz Academy
PDF
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
PDF
Cyber security course in Kerala, Kochi.pdf
PDF
cyber forensic courses in kerala,kochi..
PDF
Cyber security course near me | Cyber security institute near me.pdf
PDF
Formal Methods And Software Engineering 13th International Conference On Form...
Cyber handbook enterprise v1.6
Cyber-Handbook-Enterprise.pdf
Computer Hacking Forensic Investigator v9 | EC-Council
EC-Council Computer Hacking Forensic Investigator v9
cyber forensic courses in kerala | Enroll now
Networking Icn 2005 4th International Conference On Networking Reunion Island...
EC-Council-Cyber-Handbook-Enterprise-2024.pdf
CC 101 Introduction to Computing/Intro Comp
Cyber handbook-enterprise-v1.6
International Onshore Oct 2010
Syllabus T.Y.Bsc. I.T. (SEM V & SEM VI)
4.129 tybsc it
ScadaLab Project
Pengenalan Forensik Digital
Cyber security course in kerala | C|HFI | Blitz Academy
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
Cyber security course in Kerala, Kochi.pdf
cyber forensic courses in kerala,kochi..
Cyber security course near me | Cyber security institute near me.pdf
Formal Methods And Software Engineering 13th International Conference On Form...

More from MahmoudElmahdy32 (20)

PPTX
Business-Continuity-Management-Ensuring-Organizational-Resilience1.pptx
PPTX
mnhjyh-Lean-tqdym-qymh-hqyqyh-wtqlyl-alhdr.pptx
PPTX
Business-Impact-Analysis-Safeguarding-Your-Organizations-Future2.pptx
PPTX
Navigating-the-AI-Threat-Landscape-A-Cybersecurity-Perspective.pptx
PPTX
Advanced AI Applications for Cybersecurity.pptx
PPTX
IOT متوسط - انترنت الاشياء- واهميتة في العصر الحديث .pptx
PPTX
IOT- انترنت الاشياء- واهميتة في العصر الحديث مبتدئ.pptx
PPTX
Benefits-of-New-Construction-Techniques.pptx
PPTX
AI-Transforming-Construction in 2025.pptx
PPTX
Presentation1the Security Risk Management in.pptx.
PPTX
the Security Risk Management in ite.pptx
PPT
إدارة المشاريع الاحترافية في ال عربي.ppt
PPTX
ICTD Material PowerPoint Presentation Format.pptx
PPTX
Introduction-to-Azure-Common-Services.pptx
PPTX
Introduction-to-Azure-PowerShell-Module.pptx
PPTX
Introduction-to-PowerShell-azure-Syntax.pptx
PPT
إدارة المشاريع بالقى لبغؤيسىرتي عربي.ppt
PPTX
نموذجkjjjjhddhdh fhfga بور بوينت عربي.pptx
PPTX
Mastering the Five Basic Requirements of a Good Project Plan -.pptx
PPTX
cobit 2019Welcome to the Mastering.pptx
Business-Continuity-Management-Ensuring-Organizational-Resilience1.pptx
mnhjyh-Lean-tqdym-qymh-hqyqyh-wtqlyl-alhdr.pptx
Business-Impact-Analysis-Safeguarding-Your-Organizations-Future2.pptx
Navigating-the-AI-Threat-Landscape-A-Cybersecurity-Perspective.pptx
Advanced AI Applications for Cybersecurity.pptx
IOT متوسط - انترنت الاشياء- واهميتة في العصر الحديث .pptx
IOT- انترنت الاشياء- واهميتة في العصر الحديث مبتدئ.pptx
Benefits-of-New-Construction-Techniques.pptx
AI-Transforming-Construction in 2025.pptx
Presentation1the Security Risk Management in.pptx.
the Security Risk Management in ite.pptx
إدارة المشاريع الاحترافية في ال عربي.ppt
ICTD Material PowerPoint Presentation Format.pptx
Introduction-to-Azure-Common-Services.pptx
Introduction-to-Azure-PowerShell-Module.pptx
Introduction-to-PowerShell-azure-Syntax.pptx
إدارة المشاريع بالقى لبغؤيسىرتي عربي.ppt
نموذجkjjjjhddhdh fhfga بور بوينت عربي.pptx
Mastering the Five Basic Requirements of a Good Project Plan -.pptx
cobit 2019Welcome to the Mastering.pptx

Recently uploaded (20)

PDF
Complications of Minimal Access Surgery at WLH
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
Lesson notes of climatology university.
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Insiders guide to clinical Medicine.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
master seminar digital applications in india
PDF
Pre independence Education in Inndia.pdf
PPTX
Institutional Correction lecture only . . .
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
Microbial diseases, their pathogenesis and prophylaxis
Complications of Minimal Access Surgery at WLH
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Lesson notes of climatology university.
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Insiders guide to clinical Medicine.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
102 student loan defaulters named and shamed – Is someone you know on the list?
master seminar digital applications in india
Pre independence Education in Inndia.pdf
Institutional Correction lecture only . . .
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Module 4: Burden of Disease Tutorial Slides S2 2025
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
O7-L3 Supply Chain Operations - ICLT Program
Renaissance Architecture: A Journey from Faith to Humanism
Microbial diseases, their pathogenesis and prophylaxis

Computer_Hacking_Forensic_Investigator_C.pdf

  • 2. E C-Council Introductions ~ Name ~ Company Affiliation ~ Title / Function ~ Job Responsibility ~ System security related experience ~Expectations
  • 3. E C-Council Course Materials ~ Identity Card ~ Student Courseware ~ Lab Manual/ Workbook ~ CHFI Lab Files ~ Knoppix CD-ROM ~ Course Evaluation ~ Reference Materials
  • 4. E C-Council Course Outline ~ Module I: Computer Forensics in Today’s World ~ Module II: Law And Computer Forensics ~ Module III: Computer Investigation Process ~ Module IV: Computer Security Incident Response Team ~ Module V: Computer Forensic Laboratory Requirements ~ Module VI: Understanding File systems and Hard disks ~ Module VII: Windows Forensics
  • 5. E C-Council Course Outline (contd.) ~ Module VIII: Linux and Macintosh Boot processes ~ Module IX: Linux Forensics ~ Module XX: Data Acquisition and Duplication ~ Module XI: Recovering Deleted Files ~ Module XII: Image Files Forensics ~ Module XIII: Steganography ~ Module XIV: Computer Forensic Tools
  • 6. E C-Council Course Outline (contd.) ~ Module XV: Application password crackers ~ Module XVI: Investigating Logs ~ Module XVII: Investigating network traffic ~ Module XVIII: Router Forensics ~ Module XIX: Investigating Web Attacks ~ Module XX: Tracking E-mails and Investigating E- mail crimes
  • 7. E C-Council Course Outline (contd.) ~ Module XXI: Mobile and PDA Forensics ~ Module XXII: Investigating Trademark and Copyright Infringement ~ Module XXIII: Investigative Reports ~ Module XIV: Becoming an Expert Witness ~ Module XXV: Forensics in action
  • 8. E C-Council E C-Council Certified e- business Certification Program There are several levels of certification tracks under E C-Council Accreditation body: 1. Certified e-Business Associate 2. Certified e-Business Professional 3. Certified e-Business Consultant 4. E++ Certified Technical Consultant 5. Certified Ethical Hacker (CEH) 6 . Com puter Hacking Forensic Investigator (CHFI) Å You a re here 7. EC-Council Certified Security Analyst (ECSA) 8. EC-Council Certified Secure Programmer (ECSA) 9. Certified Secure Application Developer (CSAD) 10. Licensed Penetration Tester (LPT) 11. Master of Security Science (MSS)
  • 10. E C-Council Student Facilities Building Hours Phones Parking Messages Restrooms Smoking Recycling Meals Class Hours
  • 11. E C-Council Lab Sessions ~ Lab Sessions are designed to reinforce the classroom sessions ~ The sessions are intended to give a hands on experience only and does not guarantee proficiency.