Computer hacking forensic investigation (CHFI v8) is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.

CHFIv8 presents detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enables students to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carryout a computer forensic investigation leading to prosecution of perpetrators. Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and we can also see the consequences in our daily lives. With the onset of sophisticated cyber-attacks, the need for advanced cyber security and investigation training is a mandate in present day. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you. This course helps forensic investigators to excel in incident handling and investigate various types of security incidents such as data breaches, latest persistent security issues, insider employee threats and intricate digital forensic circumstances and cases.


Target Audience:

The CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident response.


It is strongly recommended that you attend the CEH class before enrolling into CHFI program.


5 days 


Course Content: 

Module 01: Computer Forensics in Today’s World

Module 02: Computer Forensics Investigation Process

Module 03: Searching and Seizing Computers

Module 04: Digital Evidence

Module 05: First Responder Procedures

Module 06: Computer Forensics Lab

Module 07: Understanding Hard Disks and File Systems

Module 08: Windows Forensics

Module 09: Data Acquisition and Duplication

Module 10: Recovering Deleted Files and Deleted Partitions

Module 11: Forensics Investigation using AccessData FTK

Module 12: Forensics Investigation Using EnCase

Module 13: Steganography and Image File Forensics

Module 14: Application Password Crackers

Module 15: Log Capturing and Event Correlation

Module 16: Network Forensics, Investigating Logs and Investigating Network Traffic

Module 17: Investigating Wireless Attacks

Module 19: Tracking Emails and Investigating Email Crimes

Module 20: Mobile Forensics

Module 21: Investigative Reports

Module 22: Becoming an Expert Witness