EC-Council Computer Hacking Forensic Investigator v4.0 (CHFI)
The course specified is not currently on the VTEC Schedule.
Contact us to request a class: 1-866-644-8832.
9:00am - 4:30pm
This class will give students the necessary skills to identify an intruderís footprints and to properly gather the evidence necessary to prosecute. Many of todayís top tools of the forensic trade will be taught during this course, including software, hardware, and specialized techniques. The CHFI course will provide participants with the necessary skills to identify an intruderís footprints and to properly gather the necessary evidence to prosecute in a court of law.
AUDIENCE AND PREREQUISITES
Students will be able to systematically identify evidence in computer-related crimes and abuse cases. Students may identify evidence ranging from tracing the tracks of a hacker through a clientís system, to tracing the originator of defamatory emails, to recovering signs of fraud.
The CHFI course will benefit:
- Police and other law enforcement personnel
- Defense and Military personnel
- e-Business Security professionals
- Systems administrators
- Legal professionals
- Banking, Insurance and other professionals
- Government agencies
- IT managers
It is strongly recommended that you attend CEH
before enrolling into the CHFI program.
Students must pass the CHFI Exam 312-49 to receive CHFI Certification; however, certification is optional. Please notify your Account Manager at the time of course enrollment if you'd like to purchase the exam.
The fee for the exam is $250.
The CHFI Exam can be taken at VTEC anytime after completion of the course. Contact firstname.lastname@example.org
to schedule an appointment. Exam times are subject to availability.
Our CHFI Course was updated to Version 4.0 on January 29, 2010.
This update includes the following new modules:
- Searching and Seizing of Computers
- Digital Evidence
- CD & DVD Forensics
- Windows Forensics
- Mac Forensics
- Image and File Forensics
- Audio and File Forensics
- Video File Forensics
- Logs and Capturing Event Correlation
- iPod and iPhone Forensics
- USB Forensics
- Printer Forensics
- Investigating Computer Data Breaches
- Investigating Identify Theft Cases
- Investigating Defamation over Websites and Blog
- Investigating Search Keywords
- How to Become a Digital Detective
- Computer Forensic Lawyers
- Computer Forensics and Legal Compliance
- Security Policies
- Rick Assessment
- Evaluation and Certification of Information System
- Computer Forensics Consulting Companies
vendor course description
*Course Cost listed does not include the cost of courseware or lunch, required in your registration. Please refer to your Enrollment Sales Order or Invoice for the additional cost. If you have any questions, please contact us (email@example.com or 207-775-0244).
Computer Forensics in Today's World