5 Days (9:00 AM – 5:00 PM)
Number of Questions: 150
Passing Score: 70%
Test Duration: 4 Hours
Test Format: Multiple Choice
Computer forensics training teaches that computer forensics investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. Computer Hacking Forensic investigators (CHFI) can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information. Securing and analyzing electronic evidence is a central theme in an ever-increasing number of conflict situations and criminal cases.
- Students are able to master the process of investigating cyber-crime, laws involved in cyber-crime investigation, and obtaining Search Warrant
- Students are able to identify different types of digital evidence and master the rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category
- Students are able to search and seize computers with or without a warrant, how to Use Technology to obtain information, Electronic Communications Privacy Act, and Electronic Surveillance in Communications Networks
- Students are able to recover deleted files and deleted partitions in Windows, Mac OS X, and Linux
- Students are able to investigate logs, network traffic, wireless attacks, and web attacks
- Students are able to write investigative reports
Who Should Attend
CHFI program is intended for leading technology professionals such as defence and military personnel, e-business security professionals, legal professionals, banking and insurance etc. in tracing out the devastative security breakdown issues across a span of IT industries.