Menu

Computer Hacking Forensic Investigator (CHFI)

0( 0 REVIEWS )
456 STUDENTS
Overview CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will …

Overview

CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.

Learning with Study 365 has many advantages. The course material is delivered straight to you and can be adapted to fit in with your lifestyle. It is created by experts within the industry, meaning you are receiving accurate information, which is up-to-date and easy to understand.

This course is comprised of professionally narrated e-Learning modules, interactive quizzes, tests, and exams. All delivered through a system that you will have access to 24 hours a day, 7 days a week for 365 days (12 months).

  • Course Description:
  • Course Duration:
  • Method of Assessment:
  • Certification:
  • Entry Requirement:
  • Career Path:

This online training course is comprehensive and designed to cover the key topics listed under the curriculum.

You will have 12 Months access to your online study platform from the date you purchased the course. The course is self-paced so you decide how fast or slow the training goes. You can complete the course in stages revisiting the training at any time.

At the end of the course, learners will take an online multiple choice question assessment test (please be aware, this is not the official exam). The online test is marked straight away, so you will know immediately if you have passed the course.

Successful candidates will be awarded a certificate for Computer Hacking Forensic Investigator (CHFI).

(This course is not included the official certificate) 

Learners must be age 16 or over and should have a basic understanding of the English Language, numeracy, literacy, and ICT.

This training course will lead you to become a:

  • Penetration Tester
  • Cyber Security Analyst
  • Ethical Hacker
  • Security Architect
  • Information Security Officer
  • Security Consultant
  • Senior Security Consultant
  [vc_row][vc_column][vc_cta h2="Still not convinced?" add_button="left" btn_title="Download Brochure" btn_color="green" btn_i_icon_fontawesome="fa fa-file-pdf-o" btn_add_icon="true" btn_link="url:https%3A%2F%2Fwww.study365.co.uk%2Fwp-content%2Fuploads%2F2018%2F09%2F5.-Computer-Hacking-Forensic-Investigator-CHFI.pdf||target:%20_blank|" btn_custom_onclick="true" css=".vc_custom_1475836716759{background-color: #ffffff !important;}"]Download our course brochure & learn more about this course.[/vc_cta][/vc_column][/vc_row]

Course Curriculum

free introduction
Computer Hacking Forensic Investigator (CHFI) FREE 00:00:00
Course Brochure – Computer Hacking Forensic Investigator (CHFI) FREE 00:00:00
1: Computer Forensics Introduction
1. Intro To Course-Part 1-5 00:00:00
2. Intro To Forensics-Part 1-8 00:00:00
2: Forensics Investigation Process
1. Forensics Investigation Process-Part 1-10 00:00:00
3: Searching and Seizing
1. Searching And Seizing-Part 1-5 00:00:00
4: Digital Evidence
1. Digital Evidence-Part 1-7 00:00:00
5: First Responder Procedures
1. First Responder Procedures-Part 1-8 00:00:00
6: Forensics Lab
1. Forensic Lab-Part 1-5 00:00:00
7: Hard Disks and File Systems
1. Hard Disks And File Systems-Part 1-10 00:00:00
8: Windows Forensics
1. Windows Forensics-Part 1-10 00:00:00
9: Data Acquisition and Duplication
1. Data Acquisition And Duplication-Part 1-7 00:00:00
10: Recovering Deleted Files and Partitions
1. Recovering Deleted Files And Partitions-Part 1-2 00:00:00
11: Using Access Data FTK
1. Using Access Data FTK And Special Steps-Part 1-8 00:00:00
12: Using EnCase
1. EnCase-Part 1-3 00:00:00
13: Steganography
1. Stenography-Part 1-4 00:00:00
14: Password Crackers
1. Passwords-Part 1-4 00:00:00
15: Log Correlation
1. Log Correlation-Part 1-6 00:00:00
16: Network Forensics
1. Network Forensics-Part 1-4 00:00:00
17: Wireless Attacks
1. Wireless Attacks-Part 1-3 00:00:00
18: Web Attacks
1. Web Attacks-Part 1-8 00:00:00
19: Email Crimes
1. Email Crimes-Part 1-4 00:00:00
20: Mobile Investigation
1. Mobile Investigation-Part 1-5 00:00:00
21: Investigative Reports
1. Investigation Reports-Part 1-4 00:00:00
22: Expert Witness
1. Expert Witness-Part 1-3 00:00:00

Students feedback

N.A

Avarage rating ()
5 Star
4 Star
3 Star
2 Star
1 Star

No Reviews found for this course.

Contact Us

Certificate Code

Secure Payment
top
Copyright @ 2019 -Study365 - All rights reserved.
WhatsApp chat