SlideShare a Scribd company logo
5
Most read
8
Most read
CHFI v9 01
C HFIComputer Hacking Forensic
INVESTIGATOR
TM
Every crime leaves a trail of evidence
@2017 EC-Council. All Rights Reserved. | CHFI 01/17 | www.eccouncil.org
Computer Hacking Forensic Investigator v9
SECURING
NETWORKS WITH
FORENSIC
SCIENCE
CHFI v9 02
INTRODUCING CHFI V9:
WORLD’S MOST COMPREHENSIVE
COMPUTER FORENSIC
CERTIFICATION PROGRAM
Digital technologies are changing the face of
business. As organizations rapidly embracing
digital technologies such as cloud, mobile, big
data and IOT, the context of digital forensics
is more relevant than before. The growing
number of cybercrimes has changed the role of
forensics from DNA to Digital.
According to the market research report
published by IndustryARC, by 2020, the digital
forensics market will reach 4.8 billion USD.
IndustryARC also predicts that the maximum
use of digital forensics is from the federal
sector and this will grow from $1,097.2 million
in 2015 to $2,060.5 million by 2020. The major
drivers for this are increasing threats from
cybercrime and terrorist attacks. Foote Partners,
which tracks information technology (IT)
jobs across all skill levels, projects the global
demand for cyber security talent to rise to six
million by 2019, with an expected shortfall of
1.5 million professionals.
Over the last many years, EC-Council’s CHFI
certification has gained massive traction
and recognition amongst Fortune 500
enterprises globally. It has immensely benefited
professionals from law enforcement, criminal
investigation, defense, and security field. CHFI
v9, the latest version of the program has been
designed for professionals handling digital
evidence while investigating cybercrimes. It is
developed by an experienced panel of subject
matter experts and industry specialists, and
also has set global standards for computer
forensics best practices. In addition, it also aims
at elevating the knowledge, understanding, and
skill levels of in cyber security and forensics
practitioners.
CHFI v9 03
About CHFI v9
CHFI v9 covers detailed methodological
approach to computer forensic and evidence
analysis. It provides the necessary skillset
for identification of intruder’s footprints and
gathering necessary evidence for its prosecution.
All major tools and theories used by cyber
forensic industry are covered in the curriculum.
The certification can fortify the applied
knowledge level of law enforcement personnel,
system administrators, security officers, defense
and military personnel, legal professionals,
bankers, computer and network security
professionals, and anyone who is concerned
about the integrity of the network and digital
investigations.
CHFI provides necessary skills to
perform effective digital forensic
investigation
It is a comprehensive course covering major
forensic investigation scenarios that enables
students to acquire necessary hands-on experience
on various forensic investigation techniques and
standard forensic tools necessary to successfully
carryout computer forensic investigation leading to
prosecution of perpetrators
CHFI presents a methodological approach to
computer forensic including searching and seizing,
chain-of-custody, acquisition, preservation, analysis
and reporting of digital evidence
CHFI v9 04
Courseware
Details
Course Title: Computer Hacking Forensic Investigator (CHFI) v9
Duration: 40 hours (5 days, 9:00AM – 5:00PM)
Class Format:
•	 Instructor-led classroom – Authorized Training Center (ATC)
•	 Live online training – iClass
•	 Number of Questions: 150
•	 Passing Score: 70%
•	 Test Duration: 4 hours
•	 Test Format: MCQ
•	 Test Delivery: ECC exam portal
•	 14 comprehensive modules and 39
labs
•	 More than 40 percent of new labs
•	 More than 400 new/updated tools
•	 Classroom friendly curriculum with
diagrammatic representation of
concepts and examples
•	 New and rich presentation style
with eye catching graphics
•	 Coverage of latest operating
systems
•	 Updated patch management and
testing environment
•	 Well tested, result oriented,
descriptive and analytical lab
manual to evaluate the presented
concepts
•	 IT/forensics professionals with basic knowledge on IT/cyber security,
computer forensics, and incident response
•	 Prior completion of CEH training would be an advantage
COURSE DETAILS EXAM DETAILS
WHAT’S NEW IN CHFI V9PREREQUISITES
WHO SHOULD ATTEND
•	 Anyone interested in cyber
forensics/investigations
•	 Attorneys, legal consultants, and
lawyers
•	 Law enforcement officers
•	 Police officers
•	 Federal/ government agents
•	 Defense and military
•	 Detectives/ investigators
•	 Incident response team
members
•	 Information security managers
•	 Network defenders
•	 IT professionals, IT directors/
managers
•	 System/network engineers
•	 Security analyst/ architect/
auditors/ consultants
CHFI v9 05
Course Outline
CHFI v9 curriculum is a comprehensive course with 14 training modules covering major forensic
investigation scenarios
Module 1. Computer forensics in
today’s world
Module 8. Investigating web attacks
Module 9. Database forensic
Module 10. Cloud forensic
Module 11. Malware forensic
Module 12. Investigating email crimes
Module 13. Mobile forensic
Module 14. Forensics report writing
and presentation
Module 2. Computer forensics
investigation process
Module 3. Understanding hard disks
and file systems
Module 5. Defeating anti-forensics
techniques
Module 6. Operating system forensics
Module 7. Network forensics
Module 4. Data acquisition and
duplication
CHFI v9 06
Why CHFI
•	 The CHFI v9 program has been redesigned and updated after thorough investigation including
current market requirements, job tasks analysis, and recent industry focus on forensic skills
•	 It is designed and developed by experienced subject matter experts and digital forensics practitioners
•	 CHFI is a complete vendor neutral course covering all major forensics investigations technologies and
solutions
•	 CHFI has detailed labs for hands-on learning experience. On an average, approximately 50% of
training time is dedicated to labs
•	 It covers all the relevant knowledge-bases and skills to meets with regulatory compliance standards
such as ISO 27001, PCI DSS, SOX, HIPPA, etc.
•	 The student kit contains large number of white papers for additional reading
•	 The program presents a repeatable forensics investigation methodology required from a versatile
digital forensic professional which increases employability
•	 The student kit contains several forensics investigation templates for evidence collection, chain-of-
custody, final investigation reports, etc.
•	 The program comes with cloud-based virtual labs enabling students to practice various investigation
techniques in a real-time and simulated environment
CHFI v9 07
Endorsements
and
Testimonials
ENDORSEMENTS TESTIMONIALS
NSA and CNSS: Compliant with 4012 (Senior System Managers)
training standards for information security professionals in the
federal government by the United States National Security Agency
(NSA) and the Committee on National Security Systems (CNSS)
“It is my pleasure to take the time to praise the EC-Council for having
such a magnificent class, specifically THE Computer Hacking Forensic
Investigator course. The course had an abundance of information,
utilities, programs, and hands on experience. I am a consultant at Dell
and we do have a lot of technical training, but I must comment that
this one is one of the best trainings I have seen in several years. I will
definitively recommend this course to all my colleagues.”
— Hector Alvarez,CHFI,Enterprise & Storage Consultant,
Dell Corporation,Austin,Texas
“ All the treatment has been excellent, the material and the content of
the course overcomes my expectations. Thanks to the instructor and to
Itera for their professionalism.”
— Sergio Lopez Martin,CHFI,Security Sales,IBM,Spain
“ CHFI is a certification that gives an complete overview of the
process that a forensic investigator must follow when is investigating
a cybercrime. It includes not only the right treatment of the digital
evidence in order to be accepted in the Courts but also useful tools and
techniques that can be applied to investigate an incident.”
—Virginia Aguilar,CHFI,KPMG,Madrid
“ The Computer Hacking Forensic Investigator (CHFI) certification
has been instrumental in assuring both my company and our clients
that my skillset is among the elite in the cyber security and response
profession. The CHFI allows my company to readily identify to our
DoD clients that our team is trained to perform the rigorous functions
required of cyber threat response team. Our company can now better
brand our capability to investigate cyber security incidents, perform
computer/malware forensic analysis, identify active threats, and report
our findings.”
— Brad W.Beatty,Cyber Security Analyst,Booz Allen Hamilton,USA
DVA: The Department of Veterans Affairs (DVA) has included CHFI
under its GI Bill for the reimbursement of test fees for veterans
and other eligible persons in accordance with the provisions of PL
106-419
KOMLEK and CPS: The Malaysian Military Cyber Security Warfare
Department (KOMLEK) has stipulated their military professionals
to be CHFI Certified as part of their Cyber Warfare Training
Program (CPS)
NICF: Accepted into National Infocomm Competency Framework
(NICF) infocomm professionals competency requirement list
CHFI v9 08
About EC-Council
EC-Council (International Council of E-Commerce Consultants) is one of the world's largest certification bodies for information
security professionals. EC-Council is a member-based organization that certifies individuals in various information security
and ebusiness skills. It has been certified by American National Standards Institute to meet its ANSI 17024 standard. It is the
owner and creator of the world famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI) and
EC-Council Certified Security Analyst (ECSA)/License Penetration Tester (LPT) programs, and as well as many other
programs. These programs are offered in over 140 countries and have trained over 150,000 and certified more than 60,000
security professionals through a training network of over 500 training partners globally.
Individuals who have achieved EC-Council certifications include those from some of the finest organizations around the world
such as the US Army, the FBI, Microsoft, IBM and the United Nations.
@2017 EC-Council. All Rights Reserved. | CHFI 01/17 | www.eccouncil.org

More Related Content

PDF
Splunk-Presentation
PPT
IT Security management and risk assessment
 
PPTX
Introduction to Cybersecurity Fundamentals
PDF
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
PPTX
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
PPTX
Endpoint Protection
PPTX
Cyber security
PDF
Secure Design: Threat Modeling
Splunk-Presentation
IT Security management and risk assessment
 
Introduction to Cybersecurity Fundamentals
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
Endpoint Protection
Cyber security
Secure Design: Threat Modeling

What's hot (20)

PPTX
PPTX
IBM Security QRadar
PPTX
What is zero trust model (ztm)
PDF
Cybersecurity Roadmap Development for Executives
PPTX
Security vulnerability
PPTX
An introduction to SOC (Security Operation Center)
PPTX
Vulnerability assessment and penetration testing
PPTX
Patch Management Best Practices
PDF
Building an Intelligence-Driven Security Operations Center
 
PPTX
VAPT PRESENTATION full.pptx
PDF
Cyber Threat Intelligence
PPTX
How to assess and manage cyber risk
DOCX
What is zero trust model of information security?
PPTX
Introduction to cyber security
PDF
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
PDF
Vulnerability Management
PPTX
Zero Trust Framework for Network Security​
PPTX
Security Information and Event Management (SIEM)
PPTX
Risk Assessment
PDF
Secure Code Review 101
IBM Security QRadar
What is zero trust model (ztm)
Cybersecurity Roadmap Development for Executives
Security vulnerability
An introduction to SOC (Security Operation Center)
Vulnerability assessment and penetration testing
Patch Management Best Practices
Building an Intelligence-Driven Security Operations Center
 
VAPT PRESENTATION full.pptx
Cyber Threat Intelligence
How to assess and manage cyber risk
What is zero trust model of information security?
Introduction to cyber security
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Vulnerability Management
Zero Trust Framework for Network Security​
Security Information and Event Management (SIEM)
Risk Assessment
Secure Code Review 101

Viewers also liked (19)

PDF
Utilizing Internet for Fraud Examination and Investigation
PPTX
Module 04 digital evidence
PDF
CHFI v8
PPTX
Module 17 investigating wireless attacks
PPTX
Introduction To Hacking
PPTX
10 Questions Any Training Business Should Answer - by ITpreneurs
PPTX
Module 03 searching and seizing computers
PDF
Is Cyber Resilience Really That Difficult?
PPTX
Module 18 investigating web attacks
PPTX
Module 20 mobile forensics
PPTX
Module 19 tracking emails and investigating email crimes
PDF
Cyber resilience itsm academy_april2015
PPTX
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & Risques
PPTX
Training Opportunity: Certified Mobile App Professional (CMAP) Testing
PPTX
Emirates Forensic Presentation
PDF
Digital Forensic
PDF
Cyber Resilience
PPTX
Dracos forensic flavor
PDF
Cyber forensic readiness cybercon2012 adv j fick
Utilizing Internet for Fraud Examination and Investigation
Module 04 digital evidence
CHFI v8
Module 17 investigating wireless attacks
Introduction To Hacking
10 Questions Any Training Business Should Answer - by ITpreneurs
Module 03 searching and seizing computers
Is Cyber Resilience Really That Difficult?
Module 18 investigating web attacks
Module 20 mobile forensics
Module 19 tracking emails and investigating email crimes
Cyber resilience itsm academy_april2015
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & Risques
Training Opportunity: Certified Mobile App Professional (CMAP) Testing
Emirates Forensic Presentation
Digital Forensic
Cyber Resilience
Dracos forensic flavor
Cyber forensic readiness cybercon2012 adv j fick

Similar to EC-Council Computer Hacking Forensic Investigator v9 (20)

PDF
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
PDF
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
PDF
CHFI Certification
PDF
Cyber security course in Kerala, Kochi.pdf
PDF
Cyber security course in kerala | C|HFI | Blitz Academy
PDF
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
PDF
Cyber security course near me | Cyber security institute near me.pdf
PDF
cyber forensic courses in kerala,kochi..
PPTX
cyber forensic courses in kerala | Enroll now
PPTX
Become a Certified Ethical Hacker at Blitz Academy | Near Me
PDF
Computer_Hacking_Forensic_Investigator_C.pdf
PDF
CHFI v10
PDF
Computer hacking forensic investigator
PDF
cyber security analyst certification
PDF
PDF
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
PDF
CHFI Jobs In India - Career Opportunities & Certification Guide.pdf
PPTX
Computer Hacking Forensic Investigator - CHFI
PDF
Leveraging Digital Forensics | Patricia Watson
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
CHFI Certification
Cyber security course in Kerala, Kochi.pdf
Cyber security course in kerala | C|HFI | Blitz Academy
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
Cyber security course near me | Cyber security institute near me.pdf
cyber forensic courses in kerala,kochi..
cyber forensic courses in kerala | Enroll now
Become a Certified Ethical Hacker at Blitz Academy | Near Me
Computer_Hacking_Forensic_Investigator_C.pdf
CHFI v10
Computer hacking forensic investigator
cyber security analyst certification
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
CHFI Jobs In India - Career Opportunities & Certification Guide.pdf
Computer Hacking Forensic Investigator - CHFI
Leveraging Digital Forensics | Patricia Watson

More from ITpreneurs (20)

PDF
CCC-Internet of Things Foundation
PDF
TOGAF Portfolio from ITpreneurs
PPTX
How ITpreneurs enables training providers to offer quality DevOps training pr...
PPTX
The Sky Is The Limit (CCC)
PPTX
ITpreneurs’ DevOps Portfolio- Professionalizing DevOps Skills
PPTX
Step by Step Guide
PPTX
Why SDN Skills is a Big Boost to Networking Careers
PDF
EC-Council Certified Security Analyst Program
PDF
EC-Council Certified Network Defender
PPTX
Enterprise Architecture Courseware by ITpreneurs
PDF
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
PDF
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
PDF
[Infographic] How Simulations accelerate change management (5 stages).
PDF
EC-Council Certified Secure Computer User C|SCU Program
PDF
IT4IT™
PDF
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
PDF
EC-Council Cyber Security Training and Certifications
PDF
ITpreneurs Corporate Brochure
PDF
PRINCE2®とPMBOK・ITIL®の比較
PPTX
Agile and Risk Management: How Agile Becomes Risky Business
CCC-Internet of Things Foundation
TOGAF Portfolio from ITpreneurs
How ITpreneurs enables training providers to offer quality DevOps training pr...
The Sky Is The Limit (CCC)
ITpreneurs’ DevOps Portfolio- Professionalizing DevOps Skills
Step by Step Guide
Why SDN Skills is a Big Boost to Networking Careers
EC-Council Certified Security Analyst Program
EC-Council Certified Network Defender
Enterprise Architecture Courseware by ITpreneurs
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
[Infographic] How Simulations accelerate change management (5 stages).
EC-Council Certified Secure Computer User C|SCU Program
IT4IT™
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Cyber Security Training and Certifications
ITpreneurs Corporate Brochure
PRINCE2®とPMBOK・ITIL®の比較
Agile and Risk Management: How Agile Becomes Risky Business

Recently uploaded (20)

PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
01-Introduction-to-Information-Management.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
Complications of Minimal Access Surgery at WLH
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
master seminar digital applications in india
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
Pre independence Education in Inndia.pdf
PDF
Business Ethics Teaching Materials for college
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Pharmacology of Heart Failure /Pharmacotherapy of CHF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
01-Introduction-to-Information-Management.pdf
VCE English Exam - Section C Student Revision Booklet
Supply Chain Operations Speaking Notes -ICLT Program
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Complications of Minimal Access Surgery at WLH
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
master seminar digital applications in india
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Pre independence Education in Inndia.pdf
Business Ethics Teaching Materials for college
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Microbial disease of the cardiovascular and lymphatic systems
Week 4 Term 3 Study Techniques revisited.pptx

EC-Council Computer Hacking Forensic Investigator v9

  • 1. CHFI v9 01 C HFIComputer Hacking Forensic INVESTIGATOR TM Every crime leaves a trail of evidence @2017 EC-Council. All Rights Reserved. | CHFI 01/17 | www.eccouncil.org Computer Hacking Forensic Investigator v9 SECURING NETWORKS WITH FORENSIC SCIENCE
  • 2. CHFI v9 02 INTRODUCING CHFI V9: WORLD’S MOST COMPREHENSIVE COMPUTER FORENSIC CERTIFICATION PROGRAM Digital technologies are changing the face of business. As organizations rapidly embracing digital technologies such as cloud, mobile, big data and IOT, the context of digital forensics is more relevant than before. The growing number of cybercrimes has changed the role of forensics from DNA to Digital. According to the market research report published by IndustryARC, by 2020, the digital forensics market will reach 4.8 billion USD. IndustryARC also predicts that the maximum use of digital forensics is from the federal sector and this will grow from $1,097.2 million in 2015 to $2,060.5 million by 2020. The major drivers for this are increasing threats from cybercrime and terrorist attacks. Foote Partners, which tracks information technology (IT) jobs across all skill levels, projects the global demand for cyber security talent to rise to six million by 2019, with an expected shortfall of 1.5 million professionals. Over the last many years, EC-Council’s CHFI certification has gained massive traction and recognition amongst Fortune 500 enterprises globally. It has immensely benefited professionals from law enforcement, criminal investigation, defense, and security field. CHFI v9, the latest version of the program has been designed for professionals handling digital evidence while investigating cybercrimes. It is developed by an experienced panel of subject matter experts and industry specialists, and also has set global standards for computer forensics best practices. In addition, it also aims at elevating the knowledge, understanding, and skill levels of in cyber security and forensics practitioners.
  • 3. CHFI v9 03 About CHFI v9 CHFI v9 covers detailed methodological approach to computer forensic and evidence analysis. It provides the necessary skillset for identification of intruder’s footprints and gathering necessary evidence for its prosecution. All major tools and theories used by cyber forensic industry are covered in the curriculum. The certification can fortify the applied knowledge level of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, computer and network security professionals, and anyone who is concerned about the integrity of the network and digital investigations. CHFI provides necessary skills to perform effective digital forensic investigation It is a comprehensive course covering major forensic investigation scenarios that enables students to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carryout computer forensic investigation leading to prosecution of perpetrators CHFI presents a methodological approach to computer forensic including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence
  • 4. CHFI v9 04 Courseware Details Course Title: Computer Hacking Forensic Investigator (CHFI) v9 Duration: 40 hours (5 days, 9:00AM – 5:00PM) Class Format: • Instructor-led classroom – Authorized Training Center (ATC) • Live online training – iClass • Number of Questions: 150 • Passing Score: 70% • Test Duration: 4 hours • Test Format: MCQ • Test Delivery: ECC exam portal • 14 comprehensive modules and 39 labs • More than 40 percent of new labs • More than 400 new/updated tools • Classroom friendly curriculum with diagrammatic representation of concepts and examples • New and rich presentation style with eye catching graphics • Coverage of latest operating systems • Updated patch management and testing environment • Well tested, result oriented, descriptive and analytical lab manual to evaluate the presented concepts • IT/forensics professionals with basic knowledge on IT/cyber security, computer forensics, and incident response • Prior completion of CEH training would be an advantage COURSE DETAILS EXAM DETAILS WHAT’S NEW IN CHFI V9PREREQUISITES WHO SHOULD ATTEND • Anyone interested in cyber forensics/investigations • Attorneys, legal consultants, and lawyers • Law enforcement officers • Police officers • Federal/ government agents • Defense and military • Detectives/ investigators • Incident response team members • Information security managers • Network defenders • IT professionals, IT directors/ managers • System/network engineers • Security analyst/ architect/ auditors/ consultants
  • 5. CHFI v9 05 Course Outline CHFI v9 curriculum is a comprehensive course with 14 training modules covering major forensic investigation scenarios Module 1. Computer forensics in today’s world Module 8. Investigating web attacks Module 9. Database forensic Module 10. Cloud forensic Module 11. Malware forensic Module 12. Investigating email crimes Module 13. Mobile forensic Module 14. Forensics report writing and presentation Module 2. Computer forensics investigation process Module 3. Understanding hard disks and file systems Module 5. Defeating anti-forensics techniques Module 6. Operating system forensics Module 7. Network forensics Module 4. Data acquisition and duplication
  • 6. CHFI v9 06 Why CHFI • The CHFI v9 program has been redesigned and updated after thorough investigation including current market requirements, job tasks analysis, and recent industry focus on forensic skills • It is designed and developed by experienced subject matter experts and digital forensics practitioners • CHFI is a complete vendor neutral course covering all major forensics investigations technologies and solutions • CHFI has detailed labs for hands-on learning experience. On an average, approximately 50% of training time is dedicated to labs • It covers all the relevant knowledge-bases and skills to meets with regulatory compliance standards such as ISO 27001, PCI DSS, SOX, HIPPA, etc. • The student kit contains large number of white papers for additional reading • The program presents a repeatable forensics investigation methodology required from a versatile digital forensic professional which increases employability • The student kit contains several forensics investigation templates for evidence collection, chain-of- custody, final investigation reports, etc. • The program comes with cloud-based virtual labs enabling students to practice various investigation techniques in a real-time and simulated environment
  • 7. CHFI v9 07 Endorsements and Testimonials ENDORSEMENTS TESTIMONIALS NSA and CNSS: Compliant with 4012 (Senior System Managers) training standards for information security professionals in the federal government by the United States National Security Agency (NSA) and the Committee on National Security Systems (CNSS) “It is my pleasure to take the time to praise the EC-Council for having such a magnificent class, specifically THE Computer Hacking Forensic Investigator course. The course had an abundance of information, utilities, programs, and hands on experience. I am a consultant at Dell and we do have a lot of technical training, but I must comment that this one is one of the best trainings I have seen in several years. I will definitively recommend this course to all my colleagues.” — Hector Alvarez,CHFI,Enterprise & Storage Consultant, Dell Corporation,Austin,Texas “ All the treatment has been excellent, the material and the content of the course overcomes my expectations. Thanks to the instructor and to Itera for their professionalism.” — Sergio Lopez Martin,CHFI,Security Sales,IBM,Spain “ CHFI is a certification that gives an complete overview of the process that a forensic investigator must follow when is investigating a cybercrime. It includes not only the right treatment of the digital evidence in order to be accepted in the Courts but also useful tools and techniques that can be applied to investigate an incident.” —Virginia Aguilar,CHFI,KPMG,Madrid “ The Computer Hacking Forensic Investigator (CHFI) certification has been instrumental in assuring both my company and our clients that my skillset is among the elite in the cyber security and response profession. The CHFI allows my company to readily identify to our DoD clients that our team is trained to perform the rigorous functions required of cyber threat response team. Our company can now better brand our capability to investigate cyber security incidents, perform computer/malware forensic analysis, identify active threats, and report our findings.” — Brad W.Beatty,Cyber Security Analyst,Booz Allen Hamilton,USA DVA: The Department of Veterans Affairs (DVA) has included CHFI under its GI Bill for the reimbursement of test fees for veterans and other eligible persons in accordance with the provisions of PL 106-419 KOMLEK and CPS: The Malaysian Military Cyber Security Warfare Department (KOMLEK) has stipulated their military professionals to be CHFI Certified as part of their Cyber Warfare Training Program (CPS) NICF: Accepted into National Infocomm Competency Framework (NICF) infocomm professionals competency requirement list
  • 8. CHFI v9 08 About EC-Council EC-Council (International Council of E-Commerce Consultants) is one of the world's largest certification bodies for information security professionals. EC-Council is a member-based organization that certifies individuals in various information security and ebusiness skills. It has been certified by American National Standards Institute to meet its ANSI 17024 standard. It is the owner and creator of the world famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI) and EC-Council Certified Security Analyst (ECSA)/License Penetration Tester (LPT) programs, and as well as many other programs. These programs are offered in over 140 countries and have trained over 150,000 and certified more than 60,000 security professionals through a training network of over 500 training partners globally. Individuals who have achieved EC-Council certifications include those from some of the finest organizations around the world such as the US Army, the FBI, Microsoft, IBM and the United Nations. @2017 EC-Council. All Rights Reserved. | CHFI 01/17 | www.eccouncil.org