Computer Hacking Forensic Investigator
This course presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence.Contact Us



Ideal For
The E|CHFI course is designed for all IT professionals involved with system security, computer forensics and incident response.
The E|CHFI course is designed for all IT professionals involved with system security, computer forensics and incident response.
The E|CHFI course is designed for all IT professionals involved with system security, computer forensics and incident response.
What to Expect
SKILL LEVEL
Intermediate
DURATION
3 Months
CERTIFICATION
After Completion
LANGUAGE
English
Skills You Will Learn
Computer Forensics in Today’s World
Computer Forensics Investigation Process
Understanding Hard Disks and File Systems
Data Acquisition and Duplication
Defeating Anti-forensics Techniques
Windows Forensics
Linux and Mac Forensics
Network Forensics
Computer Forensics in Today’s World
Computer Forensics Investigation Process
Understanding Hard Disks and File Systems
Data Acquisition and Duplication
Defeating Anti-forensics Techniques
Windows Forensics
Linux and Mac Forensics
Network Forensics
Computer Forensics in Today’s World
Computer Forensics Investigation Process
Understanding Hard Disks and File Systems
Data Acquisition and Duplication
Defeating Anti-forensics Techniques
Windows Forensics
Linux and Mac Forensics
Network Forensics
Investigating Web Attacks
Dark Web Forensics
Database Forensics
Cloud Forensics
Investigating Email Crimes
Malware Forensics
Mobile Forensics
IoT Forensics
Investigating Web Attacks
Dark Web Forensics
Database Forensics
Cloud Forensics
Investigating Email Crimes
Malware Forensics
Mobile Forensics
IoT Forensics
Investigating Web Attacks
Dark Web Forensics
Database Forensics
Cloud Forensics
Investigating Email Crimes
Malware Forensics
Mobile Forensics
IoT Forensics
Module
Expand All +
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2
Module
Expand All +
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2
Course Outcome
Comprehensive forensics investigation process
Forensics of file systems, operating systems, network and database, websites, and email systems
Techniques for investigating on cloud, malware, and mobile
Data acquisition and analysis as well as anti-forensic techniques
Thorough understanding of chain of custody, forensic report, and presentation
Comprehensive forensics investigation process
Forensics of file systems, operating systems, network and database, websites, and email systems
Techniques for investigating on cloud, malware, and mobile
Data acquisition and analysis as well as anti-forensic techniques
Thorough understanding of chain of custody, forensic report, and presentation
Comprehensive forensics investigation process
Forensics of file systems, operating systems, network and database, websites, and email systems
Techniques for investigating on cloud, malware, and mobile
Data acquisition and analysis as well as anti-forensic techniques
Thorough understanding of chain of custody, forensic report, and presentation
Course Intake
1 Jan 2025 → 1 March 2025
2 days | Monday and Thursday | 8PM → 10PM
Content Provider



EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
Module
Expand All +
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2
Module
Expand All +
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2