Computer Hacking Forensic Investigator (CHFI) Certification Training | Emigo
ccna-banner-image

EC-Council Computer Hacking Forensic Investigator (CHFI)

EC-Council Certified Hacking Forensic Investigator (CHFI) Certification validates expertise in digital forensics, cybercrime investigation, evidence collection, and incident response, equipping profes

EC-Council Computer Hacking Forensic Investigator (CHFI)

EC-Council Certified Hacking Forensic Investigator (CHFI) Certification validates expertise in digital forensics, cybercrime investigation, evidence collection, and incident response, equipping professionals with advanced skills to detect, analyze, and prevent cyber threats effectively.

Course Overview

EC-Council’s Certified Hacking Forensic Investigator (CHFI) is a leading ANSI-accredited certification focused on digital forensics and cyber investigation. CHFI equips professionals with advanced techniques for detecting, analyzing, and recovering digital evidence related to cybercrimes such as intellectual property theft, fraud, and data breaches. The program covers essential forensic methodologies, including computer data recovery, Dark Web investigations, IoT, and Cloud Forensics, ensuring a comprehensive approach to digital investigations.

EMIGO NETWORKS, a trusted training provider, offers expert-led CHFI training designed for IT professionals in cybersecurity, incident response, and digital forensics. This hands-on, vendor-neutral program prepares forensic analysts, cybercrime investigators, security consultants, and IT auditors to handle complex cyber incidents using cutting-edge forensic tools and methodologies.

What You'll Learn

  • Master a structured forensics workflow: search and seizure, evidence preservation, analysis, and reporting. 
  • Perform deep-dive investigations across diverse environments, including desktops, servers, networks, cloud, mobile, IoT, web applications, and malware. 
  • Conduct forensic data acquisition, validate chain of custody, and maintain legal admissibility of evidence. 
  • Analyze file systems, recover deleted files, and examine complex formats across Windows, Linux, and macOS. 
  • Detect anti-forensic activities and use advanced tools in malware and memory forensics. 
  • Hands-on experience with 68+ realistic forensic labs using tools like Splunk and DNSQuerySniffer.

About Certification Exam

  • Exam Title: CHFI
  • Exam Code: 312-49
  • Duration: 4-hours
  • Number of Questions: 150
  • ECC exam voucher: $650 (plus tax where applicable & price may vary on location)
  • Availability: EC-Council Exam Portal
  • Passing Score: 60% - 85%

Syllabus Summary

Computer Forensics in Today’s World
  • Understand the Fundamentals of Computer Forensics
  • Understand Cybercrimes and their Investigation Procedures
  • Understand Digital Evidence
  • Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics
  • Identify the Roles and Responsibilities of a Forensic Investigator
  • Understand the Challenges Faced in Investigating Cybercrimes
  • Understand Legal Compliance in Computer Forensics
Computer Forensics Investigation Process
  • Understand the Forensic Investigation Process and its Importance
  • Understand the Pre-investigation Phase
  • Understand First Response
  • Understand the Investigation Phase
  • Understand the Post-investigation Phase
Understanding Hard Disks and File Systems
  • Describe Different Types of Disk Drives and their Characteristics
  • Explain the Logical Structure of a Disk
  • Understand Booting Process of Windows, Linux and Mac Operating Systems
  • Understand Various File Systems of Windows, Linux and Mac Operating Systems
  • Examine File System Using Autopsy and The Sleuth Kit Tools
  • Understand Storage Systems
  • Understand Encoding Standards and Hex Editors
  • Analyze Popular File Formats Using Hex Editor
Data Acquisition and Duplication
  • Understand Data Acquisition Fundamentals
  • Understand Data Acquisition Methodology
  • Prepare an Image File for Examination
Defeating Anti-forensics Techniques
  • Understand Anti-forensics Techniques
  • Discuss Data Deletion and Recycle Bin Forensics
  • Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions
  • Explore Password Cracking/Bypassing Techniques
  • Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch
  • Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption
  • Detect Program Packers and Footprint Minimizing Techniques
  • Understand Anti-forensics Countermeasures
  • Anti-Forensics techniques
Windows Forensics
  • Collect Volatile and Non-volatile Information
  • Perform Windows Memory and Registry Analysis
  • Examine the Cache, Cookie and History Recorded in Web Browsers
  • Examine Windows Files and Metadata
  • Understand ShellBags, LNK Files, and Jump Lists
  • Understand Text-based Logs and Windows Event Logs
Linux and Mac Forensics
  • Understand Volatile and Non-volatile Data in Linux
  • Analyze Filesystem Images Using The Sleuth Kit
  • Demonstrate Memory Forensics Using Volatility & PhotoRec
  • Understand Mac Forensics
Network Forensics
  • Understand Network Forensics
  • Explain Logging Fundamentals and Network Forensic Readiness
  • Summarize Event Correlation Concepts
  • Identify Indicators of Compromise (IoCs) from Network Logs
  • Investigate Network Traffic
  • Perform Incident Detection and Examination with SIEM Tools
  • Monitor and Detect Wireless Network Attacks
Investigating Web Attacks
  • Understand Web Application Forensics
  • Understand Internet Information Services (IIS) Logs
  • Understand Apache Web Server Logs
  • Understand the Functionality of Intrusion Detection System (IDS)
  • Understand the Functionality of Web Application Firewall (WAF)
  • Investigate Web Attacks on Windows-based Servers
  • Detect and Investigate Various Attacks on Web Applications
Dark Web Forensics
  • Understand the Dark Web
  • Determine How to Identify the Traces of Tor Browser during Investigation
  • Perform Tor Browser Forensics
Database Forensics
  • Understand Database Forensics and its Importance
  • Determine Data Storage and Database Evidence Repositories in MSSQL Server
  • Collect Evidence Files on MSSQL Server
  • Perform MSSQL Forensics
  • Understand Internal Architecture of MySQL and Structure of Data Directory
  • Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis
  • Perform MySQL Forensics on WordPress Web Application Database
Cloud Forensics
  • Understand the Basic Cloud Computing Concepts
  • Understand Cloud Forensics
  • Understand the Fundamentals of Amazon Web Services (AWS)
  • Determine How to Investigate Security Incidents in AWS
  • Understand the Fundamentals of Microsoft Azure
  • Determine How to Investigate Security Incidents in Azure
  • Understand Forensic Methodologies for Containers and Microservices
Investigating Email Crimes
  • Understand Email Basics
  • Understand Email Crime Investigation and its Steps
  • U.S. Laws Against Email Crime
Malware Forensics
  • Define Malware and Identify the Common Techniques Attackers Use to Spread Malware
  • Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis
  • Understand and Perform Static Analysis of Malware
  • Analyze Suspicious Word and PDF Documents
  • Understand Dynamic Malware Analysis Fundamentals and Approaches
  • Analyze Malware Behavior on System Properties in Real-time
  • Analyze Malware Behavior on Network in Real-time
  • Describe Fileless Malware Attacks and How they Happen
  • Perform Fileless Malware Analysis - Emotet
Mobile Forensics
  • Understand the Importance of Mobile Device Forensics
  • Illustrate Architectural Layers and Boot Processes of Android and iOS Devices
  • Explain the Steps Involved in Mobile Forensics Process
  • Investigate Cellular Network Data
  • Understand SIM File System and its Data Acquisition Method
  • Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices
  • Perform Logical Acquisition on Android and iOS Devices
  • Perform Physical Acquisition on Android and iOS Devices
  • Discuss Mobile Forensics Challenges and Prepare Investigation Report
IOT Forensics
  • Understand IoT and IoT Security Problems
  • Recognize Different Types of IoT Threats
  • Understand IoT Forensics
  • Perform Forensics on IoT Devices

Pre-requisites

  • Completing official EC-Council CHFI training automatically qualifies you to sit for the certification exam. 
  • Alternatively, candidates may attempt the exam via self-study, provided they submit proof of at least 2 years of work experience in information security, pay the eligibility application fee, and successfully gain approval.

Required Exams

  • EXAM : 312-49  
  • COST : $550 USD
  • DURATION : 4 Hours

Who should attend 

  • Law Enforcement Officer
  • Defense/Military Personnel
  • System Administrator
  • Security Officer
  • Legal Professional
  • Banking/Insurance Professional
  • Cyber Threat Analyst
  • Digital Forensic Analyst
  • Incident Responder
  • Cybersecurity Consultant

Related Courses

experts-banner-background

EMIGO Expert Training Team

new-batch-mage

New Batches Commence On

Testimonials

enquiry-section1-bg
enquiry-form-model1

Learn like a Leader
Not a follower

Scan or Click on the QR Code to submit your enquiry

Enquiry
enquiry-section1-qrcode
footer-enquiry footer-enquiry