Computer Hacking Forensic Investigator
This course presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence.Contact Us



This Course Is Ideal For
The E|CHFI course is designed for all IT professionals involved with system security, computer forensics and incident response.
The E|CHFI course is designed for all IT professionals involved with system security, computer forensics and incident response.
The E|CHFI course is designed for all IT professionals involved with system security, computer forensics and incident response.
What to Expect In This Course
SKILL LEVEL
Intermediate
DURATION
3 Months
CERTIFICATION
After Completion
LANGUAGE
English
Skill You Will Learn
Computer Forensics in Today’s World
Computer Forensics Investigation Process
Understanding Hard Disks and File Systems
Data Acquisition and Duplication
Defeating Anti-forensics Techniques
Windows Forensics
Linux and Mac Forensics
Network Forensics
Computer Forensics in Today’s World
Computer Forensics Investigation Process
Understanding Hard Disks and File Systems
Data Acquisition and Duplication
Defeating Anti-forensics Techniques
Windows Forensics
Linux and Mac Forensics
Network Forensics
Computer Forensics in Today’s World
Computer Forensics Investigation Process
Understanding Hard Disks and File Systems
Data Acquisition and Duplication
Defeating Anti-forensics Techniques
Windows Forensics
Linux and Mac Forensics
Network Forensics
Programme Module
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2
Programme Module
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2
Outcomes of the Course
Comprehensive forensics investigation process
Forensics of file systems, operating systems, network and database, websites, and email systems
Techniques for investigating on cloud, malware, and mobile
Data acquisition and analysis as well as anti-forensic techniques
Thorough understanding of chain of custody, forensic report, and presentation
Comprehensive forensics investigation process
Forensics of file systems, operating systems, network and database, websites, and email systems
Techniques for investigating on cloud, malware, and mobile
Data acquisition and analysis as well as anti-forensic techniques
Thorough understanding of chain of custody, forensic report, and presentation
Comprehensive forensics investigation process
Forensics of file systems, operating systems, network and database, websites, and email systems
Techniques for investigating on cloud, malware, and mobile
Data acquisition and analysis as well as anti-forensic techniques
Thorough understanding of chain of custody, forensic report, and presentation
Course Intake
1 Jan 2025 → 1 March 2025
2 days | Monday and Thursday | 8PM → 10PM
Content Provider



EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
Programme Module
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2
Programme Module
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2