Computer Hacking Forensic Investigator (CHFI)

Computer Hacking Forensic Investigator (CHFI) - Banner

Become a
Computer Hacking Forensic Investigator (CHFI)

CERTIFIED PROFESSIONALS

IN 145 COUNTRIES

EC-Council’s Computer Hacking Forensic Investigator (CHFI) is the only comprehensive ANSI accredited, lab-focused program in the market that gives organizations vendor-neutral training in digital forensics. CHFI provides its attendees with a firm grasp of digital forensics, presenting a detailed and methodological approach to digital forensics and evidence analysis that also pivots around Dark Web, IoT, and Cloud Forensics. The tools and techniques covered in this program will prepare the learner for conducting digital investigations using ground-breaking digital forensics technologies.

The program is designed for IT professionals involved with information system security, computer forensics, and incident response. It will help fortify the application knowledge in digital forensics for forensic analysts, cybercrime investigators, cyber defense forensic analysts, incident responders, information technology auditors, malware analysts, security consultants, and chief security officers.

The program equips candidates with the necessary skills to proactively investigate complex security threats, allowing them to investigate, record, and report cybercrimes to prevent future attacks.

NEED TRAINING?

EC-Council’s Official delivery platform includes your study material, virtual labs and gives you the most flexible options for training to fit your busy work schedule!

Training Options
Talk to an Expert

Are you ready to get Certified?

Program Information

Course Outline

Module 01: Computer Forensics in Today’s World

Module 02: Computer Forensics Investigation Process

Module 03: Understanding Hard Disks and File Systems

Module 04: Data Acquisition and Duplication

Module 05: Defeating Anti-Forensics Techniques

Module 06: Windows Forensics

Module 07: Linux and Mac Forensics

Module 08: Network Forensics

Module 09: Investigating Web Attacks

Module 10: Dark Web Forensics

Module 11: Database Forensics

Module 12: Cloud Forensics

Module 13: Investigating Email Crimes

Module 14: Malware Forensics

Module 15: Mobile Forensics

Module 16: IoT Forensics

Who Is It For?

The CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident response.

Target Audience

  • Police and other law enforcement personnel
  • Defense and Security personnel
  • e-Business Security professionals
  • Legal professionals
  • Banking, Insurance, and other professionals
  • Government agencies
  • IT managers
  • Digital Forensics Service Providers

Training Options

    • iLearn (Self-Study)
      This solution is an asynchronous, self-study environment that delivers EC-Council’s sought-after CHFI, digital forensics training courses in a streaming video format.
  • Master Class
    This solution offers the opportunity to learn Certified Hacking Forensic Investigator from world-class instructors in collaboration with top digital forensics professionals.
  • Training Partner (Instructor led training)
    CHFI v10 is available globally through EC-Council’s Authorized Training Partners. Conveniently located in your area, this offers you the benefit of learning from experienced certified EC-Council instructors along with your peers.
  • Academia
    This solution offers CHFI v10 through EC-Council Academia Partner institutions and is for students enrolled in applicable college or university degree programs.

About the CHFI Exam

The CHFI certification is awarded after successfully passing exam EC0 312-49. CHFI EC0 312-49 exams are available at ECC exam centers around the world.
CHFI Exam Details

  • Number of Questions: 150
  • Test Duration: 4 hours
  • Test Format: Multiple Choice
  • Test Delivery: ECC exam portal
Passing Score

In order to maintain the high integrity of our certification exams, EC-Council Exams are provided in multiple forms (i.e., different question banks). Each form is carefully analyzed through beta testing with an appropriate sample group under the purview of a committee of subject matter experts, ensuring that each of our exams is not only academically sound, but also has “real world” applicability. We apply an internal process to determine the difficulty rating of each question. The individual rating then contributes to an overall “Cut Score” for each exam form. To ensure each form has equal assessment standards, cut scores are set on a “per exam form” basis. Depending on which exam form is challenged, cut scores can range from 60% to 85%.

Clause: Age Requirements and Policies Concerning Minors

The age requirement for attending the training or the exam is restricted to any candidate that is permitted by his/her country of origin/residency.

If the candidate is under the legal age as permitted by his/her country of origin/residency, they are not eligible to attend the official training or eligible to attempt the certification exam unless they provide the accredited training center/EC-Council a written consent/indemnity of their parent/legal guardian and a supporting letter from their institution of higher learning. Only candidates from a nationally accredited institution of higher learning shall be considered.

Brochure


Seek-Solve-Submit with the all new CHFI v10

Career with CHFI

Certified Hacking Forensic Investigator v10 has been designed by industry experts to provide an unbiased approach to applying complex  investigation  practices, empowering  Forensic  Professionals to:

  • Play an active role in investigating and preserving digital and non-digital evidence of an attack.
  • Counter to the series of compromises.
  • Use threat intelligence to anticipate and alert cyber teams in case of future attacks.

Why CHFI is in Demand Globally?

Common Job Roles for CHFI Logo

CHFI Infographics

ECC-FirstLook-redEC-Council FirstlookLearn MoreIf you are interested in any of our certification courses, sign up to try before you buy!

Train now, pay later with Affirm.

Available to US Residents Only.

An Adaptive Security Strategy

CND is an adaptive security strategy built on a 4-pronged approach — Protect, Detect, Respond, and Predict. This approach not only proves effective in responding to a network attack but stops them before they happen.

Protect

  • Defense-In-Depth Security
  • Properly Designed, Implemented and Enforced Security Policies
  • Security Architectures
  • Appropriate Configuration
  • Right Selection of Security Controls

Detect

  • Traffic Monitoring
  • Log Management
  • Log Monitoring
  • Anomalies Detection

Respond

  • Incident Response
  • Forensics Investigation
  • Business Continuity (BC)
  • Disaster Recovery (DR)

Predict

  • Risk and Vulnerability Assessment
  • Attack Surface Analysis
  • Threat Intelligence

How You Will Benefit

A BREACH can be BRUTAL. Investing in building an expert in-house forensics team with CHFI training and certification is a strategic move for enterprises looking to safeguard their stakeholders’ interests as well as their own. CHFI empowers their existing team with learning the latest investigation practices.

  • The course aligns with all the crucial forensic job roles across the globe.
  • It is an ANSI 17024 accredited Certification Program, mapped to the NICE 2.0 framework.
  • The course focuses on the latest technologies including IoT Forensics, Dark Web Forensics, Cloud Forensics (including Azure and AWS), Network Forensics, Database Forensics, Mobile Forensics, Malware Forensics (including Emotet and Eternal Blue), OS Forensics, RAM forensics and Tor Forensics, CHFI v10 covers the latest tools, techniques, and methodologies along with ample crafted evidence files.

How-you-will

icon box image

Detailed Methodological Learning Approach

CHFI presents a methodological approach to computer forensic including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence.

icon box image

Dark Web & IoT Forensics

The first certification program to offer  you  Dark Web and IoT Forensics modules.

icon box image

Extensive Coverage on Malware Forensics

Covers latest malware samples like Emotet and Eternal Blue, also known as WannaCry.

icon box image

Forensic Methodologies for Cloud Infrastructure

Master tools and techniques to ensure security across various cloud platforms — Amazon Web Services, Microsoft Azure Cloud, and Google Cloud Platform.

icon box image

50 GB of Crafted Evidence Files

CHFI v10 provides you with 50 GB of crafted evidence files for investigation purposes which helps to have hands-on experience in evidence collection.

icon box image

50+ Complex Labs

The only program that provides thorough learning with a simulated environment with 50+ complex labs to ensure you obtain must have skills for your next job.

Download EC-Council Certification Track