CHFI TRAINING 2021, Hackers University APC Learning Solutions
CHFI Course Outline
Computer Forensics in Today’s World
Computer Forensics Investigation Process
Understanding Hard Disks and File Systems
Operating System Forensics
Defeating Anti-Forensics Techniques
Data Acquisition and Duplication
Network Forensics
Investigating Web Attacks
Database Forensics
Cloud Forensics
Malware Forensics
Investigating E-mail Crimes
Mobile Forensics
Investigative Reports
A CHFI certified professional will be equipped to be gainfully employed as a Computer Forensics or a Digital Forensics professional. They will be able to:
Perform incident response and computer forensics Identify data, images and/or activity which may be the target of an internal investigation
Perform electronic evidence collections .Establish threat intelligence and key learning points to support pro-active profiling and scenario modelling
Perform digital forensic acquisitions as an analyst Search file slack space where PC type technologies are employed
Perform bit-stream Imaging/acquiring of the digital media seized during the process of investigation. File MAC times (Modified, Accessed, and Create dates and times) as evidence of access and event sequences
Examine and analyze text, graphics, multimedia, and digital images Examine file type and file header information
Conduct thorough examinations of computer hard disk drives, and other electronic data storage media Review e-mail communications including web mail and Internet Instant Messaging programs
Recover information and electronic data from computer hard drives and other data storage devices Examine the Internet browsing history
Follow strict data and evidence handling procedures Generate reports which detail the approach, and an audit trail which documents actions taken to support the integrity of the internal investigation process
Maintain audit trail (i.e., chain of custody) and evidence integrity
Work on technical examination, analysis, and reporting of computer-based evidence.Recover active, system and hidden files with date/time stamp information
Prepare and maintain case files. Crack (or attempt to crack) password protected files
Utilize forensic tools and investigative methods to find electronic data, including.Perform anti-forensics detection
Internet use history, word processing documents, images, and other files.Maintain awareness and follow laboratory evidence handling, evidence examination, laboratory safety, and laboratory security policy and procedures
Gather volatile and non-volatile information from Windows, MAC, and Linux Play a role of the first responder by securing and evaluating a cybercrime scene, conducting preliminary interviews, documenting a crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, reporting of the crime scene
Recover deleted files and partitions in Windows, Mac OS X, and Linux Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
Perform keyword searches including using target words or phrases. Apply advanced forensic tools and techniques for attack reconstruction
Investigate events for evidence of insider threats or attacks Perform fundamental forensic activities and form a base for advanced digital forensics
Support the generation of incident reports and other collateral Identify and check the possible source/incident origin
Investigate and analyze all response activities related to cyber incidents Perform event co-relation
Plan, coordinate and direct recovery activities and incident analysis tasks .Extract and analyze logs from various devices such as proxies, firewalls, IPSs, IDSes, Desktops, laptops, servers, SIM tools, routers, switches, AD servers, DHCP servers, Access Control Systems, etc.
Examine all available information and supporting evidence or artifacts related to an incident or even Ensure that reported incident or suspected weaknesses, malfunctions and deviations are handled with confidentiality
Collect data using forensic technology methods in accordance with evidence handling procedures, including a collection of hard copy and electronic documents.Assist in the preparation of search and seizure warrants, court orders, and subpoenas
Conduct reverse engineering for known and suspected malware files Provide expert witness testimony in support of forensic examinations conducted by the examiner
Perform detailed evaluation of the data and any evidence of activity in order to analyze the full circumstances and implications of the event.
About the CHFI Exam
The CHFI certification is awarded after successfully passing the exam EC0 312-49. CHFI EC0 312-49 exams are available at ECC exam centers around the world.
CHFI Exam Details
Number of Questions: 150
Test Duration: 4 hours
Test Format: Multiple choice
Test Delivery: ECC exam portal
by Hackers University, APC Learning Solutions
linux dhcp server