Thumb chfi banner all 0221

EC-Council Computer Hacking Forensic Investigator, C|HFI


Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interest of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information.  The Certified Hacking Forensic Investigator certification emphasizes forensics tools, analytical techniques, and procedures involved in obtaining, maintaining, and presenting computer forensic evidence and data in a court of law.

The C|HFI course is the most extensive and propelled accreditation program that summarizes the essential knowledge of digital forensic techniques and standard forensic tools to collect the intruder's footprints necessary for his investigation. The course delivers a few methodological ways to deal with digital forensics, including seizing, a chain of custody, acquisition preservation, analysis, and presentation of digital evidence. CHFI participants will be trained to lead successful procedures in different sorts of security incidents, for example, information ruptures, corporate secret activities, and other intricate cases involving computer systems. The certification will cover the different types of computer forensics programs that help in detecting hacking attacks and properly extracting evidence to report the crime and conduct detailed audits for preventing future attacks.

This C|HFI course also covers analysis tools and techniques that can be employed for a computer investigation for determining potential legal evidence against the perpetrator. Evidence might be related to a wide range of cyber-crimes, including but not limited to misuse of confidential data, theft of trade secrets, misuse or destruction of intellectual property, and online fraud. A computer forensics certification or C|HFI certification imparts core skills for data recovery that encompasses discovering hidden data residing in a system and recovering lost, encrypted, deleted, or damaged data.

This course supports a certification that is a DoD Approved 8570 Baseline Certification and meets DoD 8570 training requirements


Who should take this course:

The C|HFI program is meant for professionals who are involved with information system security, computer forensics, and incident response:

  • Computer Forensic Analyst
  • Computer Network Defense (CND) Forensic Analyst
  • Digital Forensic Examiner
  • Forensic Analyst and technician
  • Network Forensic Examiner
  • Computer Crime Investigator
  • Special Agent


What you will learn:

  • Finding out about various kinds of cyber laws for investigating cyber-crimes.
  • Analyzing digital evidence through rules of evidence by considering crime category.
  • Roles of the first responder, first responder toolkit, securing and assessing electronic crime scene, directing preliminary interviews, archiving electronic crime scene, gathering and safeguarding electronic proof, bundling and transporting electronic crime scene, and detailing electronic crime scene.
  • Setting up the computer forensics lab and creating investigation reports.
  • Steganography, Steganalysis and image forensics.
  • Kinds of log capturing, log management, Investigation logs, network traffic, wireless attacks, and web assaults.
  • Gathering volatile and non-volatile data from Windows and recouping erased documents from Windows, Mac OS X, and Linux. Researching password-secured documents by utilizing password cracking concepts and tools


This training program prepares you for the exam by addressing topics including a comprehensive cyber-crime overview, in-depth coverage of the computer forensics investigation process, search and seizure of computers, working with digital evidence, incident handling and first responder procedures, gathering volatile and non-volatile data from a Windows computer, recovering deleted files and partitions from Windows, Macintosh, and Linux systems, using AccessData FTK and Encase Steganography, password cracking, log capturing tools and techniques, investigating network traffic, wireless attacks, Web attacks, and e-mail crimes.


Program Components

  • Complete C|HFI Self Paced Training Program
  • C|HFI Courseware 
  • C|HFI Computer Hacking Forensics Investigator Lab Manual
  • The Official C|HFI Study Guide
  • C|HFI Tool Kit on USB





iStudy App