Existing User Login

New User? Create An Account

Request new password

We are iCollege

Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success.

Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home. We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be.

Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

Computer Hacking Forensic Investigator (CHFI)

EDUTAINMENT COURSE E-Learning

Computer Hacking Forensic Investigator (CHFI)

Interactive and entertaining talk-show style format presented by industry leading experts.
Overview

A criminal always leaves a trace of evidence behind. Become a CHFI with EC-Council’s online course on CHFI certification. This online training course certifies individuals in forensic security discipline from a vendor-neutral perspective and enhances their knowledge of digital forensics to investigate and prevent cyber attacks efficiently. Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.

Objectives
  • Official EC-Council Curriculum
  • After-course instructor coaching benefit
Target Audience
  • Police and other law enforcement personnel
  • Defense and Military personnel
  • e-Business Security professionals
  • Systems administrators
  • Legal professionals
  • Banking, Insurance and other professionals
  • Government agencies
  • IT managers

Module 1: Computer Forensics Introduction

1.0 Intro to Course Pt. 1

1.1 Intro to Course Pt. 2

1.2 Intro to Course Pt. 3

1.3 Intro to Course Pt. 4

1.4 Intro to Course Pt. 5

1.5 Intro to Forensics Pt. 1

1.6 Intro to Forensics Pt. 2

1.7 Intro to Forensics Pt. 3

1.8 Intro to Forensics Pt. 4

1.9 Intro to Forensics Pt. 5

1.10 Intro to Forensics Pt. 6

1.11 Intro to Forensics Pt. 7

1.12 Intro to Forensics Pt. 8

Module 2: Forensics Investigation Process

2.0 Forensics Investigation Process Pt. 1

2.1 Forensics Investigation Process Pt. 2

2.2 Forensics Investigation Process Pt. 3

2.3 Forensics Investigation Process Pt. 4

2.4 Forensics Investigation Process Pt. 5

2.5 Forensics Investigation Process Pt. 6

2.6 Forensics Investigation Process Pt. 7

2.7 Forensics Investigation Process Pt. 8

2.8 Forensics Investigation Process Pt. 9

2.9 Forensics Investigation Process Pt. 10

Module 3: Searching and Seizing

3.0 Searching and Seizing Pt. 1

3.1 Searching and Seizing Pt. 2

3.2 Searching and Seizing Pt. 3

3.3 Searching and Seizing Pt. 4

3.4 Searching and Seizing Pt. 5

Module 4: Digital Evidence

4.0 Digital Evidence Pt. 1

4.1 Digital Evidence Pt. 2

4.2 Digital Evidence Pt. 3

4.3 Digital Evidence Pt. 4

4.4 Digital Evidence Pt. 5

4.5 Digital Evidence Pt. 6

4.6 Digital Evidence Pt. 7

Module 5: First Responder Procedures

5.0 First Responder Procedures Pt. 1

5.1 First Responder Procedures Pt. 2

5.2 First Responder Procedures Pt. 3

5.3 First Responder Procedures Pt. 4

5.4 First Responder Procedures Pt. 5

5.5 First Responder Procedures Pt. 6

5.6 First Responder Procedures Pt. 7

5.7 First Responder Procedures Pt. 8

Module 6: Forensics Lab

6.0 Forensic Lab Pt. 1

6.1 Forensic Lab Pt. 2

6.2 Forensic Lab Pt. 3

6.3 Forensic Lab Pt. 4

6.4 Forensic Lab Pt. 5

Module 7: Hard Disks and File Systems

7.0 Hard Disks and File Systems Pt. 1

7.1 Hard Disks and File Systems Pt. 2

7.2 Hard Disks and File Systems Pt. 3

7.3 Hard Disks and File Systems Pt. 4 

7.4 Hard Disks and File Systems Pt. 5

7.5 Hard Disks and File Systems Pt. 6

7.6 Hard Disks and File Systems Pt. 7

7.7 Hard Disks and File Systems Pt. 8

7.8 Hard Disks and File Systems Pt. 9

7.9 Hard Disks and File Systems Pt. 10

Module 8: Windows Forensics

8.0 Windows Forensics Pt. 1

8.1 Windows Forensics Pt. 2

8.2 Windows Forensics Pt. 3

8.3 Windows Forensics Pt. 4

8.4 Windows Forensics Pt. 5

8.5 Windows Forensics Pt. 6

8.6 Windows Forensics Pt. 7

8.7 Windows Forensics Pt. 8

8.8 Windows Forensics Pt. 9

8.9 Windows Forensics Pt. 10

Module 9: Data Acquisition and Duplication

9.0 Data Acquisition and Duplication Pt. 1

9.1 Data Acquisition and Duplication Pt. 2

9.2 Data Acquisition and Duplication Pt. 3

9.3 Data Acquisition and Duplication Pt. 4

9.4 Data Acquisition and Duplication Pt. 5

9.5 Data Acquisition and Duplication Pt. 6

9.6 Data Acquisition and Duplication Pt. 7

Module 10: Recovering Deleted Files and Partitions

10.0 Recovering Deleted Files and Partitions Pt. 1

10.1 Recovering Deleted Files and Partitions Pt. 2

Module 11: Using Access Data FTK

11.0 Using Access Data FTK and Special Steps Pt. 1

11.1 Using Access Data FTK and Special Steps Pt. 2

11.2 Using Access Data FTK and Special Steps Pt. 3

11.3 Using Access Data FTK and Special Steps Pt. 4

11.4 Using Access Data FTK and Special Steps Pt. 5

11.5 Using Access Data FTK and Special Steps Pt. 6

11.6 Using Access Data FTK and Special Steps Pt. 7

11.7 Using Access Data FTK and Special Steps Pt. 8

Module 12: Using EnCase

12.0 EnCase Pt. 1

12.1 EnCase Pt. 2

12.2 EnCase Pt. 3

Module 13: Steganography

13.0 Stenography Pt. 1

13.1 Stenography Pt. 2

13.2 Stenography Pt. 3

13.3 Stenography Pt. 4

Module 14: Password Crackers

14.0 Passwords Pt. 1

14.1 Passwords Pt. 2

14.2 Passwords Pt. 3

14.3 Passwords Pt. 4

Module 15: Log Correlation

15.0 Log Correlation Pt. 1

15.1 Log Correlation Pt. 2

15.2 Log Correlation Pt. 3

15.3 Log Correlation Pt. 4

15.4 Log Correlation Pt. 5

15.5 Log Correlation Pt. 6

Module 16: Network Forensics

16.0 Network Forensics Pt. 1

16.1 Network Forensics Pt. 2

16.2 Network Forensics Pt. 3

16.3 Network Forensics Pt. 4

Module 17: Wireless Attacks

17.0 Wireless Attacks Pt. 1

17.1 Wireless Attacks Pt. 2

17.2 Wireless Attacks Pt. 3

Module 18: Web Attacks

18.0 Web Attacks Pt. 1

18.1 Web Attacks Pt. 2

18.2 Web Attacks Pt. 3

18.3 Web Attacks Pt. 4

18.4 Web Attacks Pt. 5

18.5 Web Attacks Pt. 6

18.6 Web Attacks Pt. 7

18.7 Web Attacks Pt. 8

Module 19: Email Crimes

19.0 Email Crimes Pt. 1

19.1 Email Crimes Pt. 2

19.2 Email Crimes Pt. 3

19.3 Email Crimes Pt. 4

Module 20: Mobile Investigation

20.0 Mobile Investigation Pt. 1

20.1 Mobile Investigation Pt. 2

20.2 Mobile Investigation Pt. 3

20.3 Mobile Investigation Pt. 4

20.4 Mobile Investigation Pt. 5

Module 21: Investigative Reports

21.0 Investigation Reports Pt. 1

21.1 Investigation Reports Pt. 2

21.2 Investigation Reports Pt. 3

21.3 Investigation Reports Pt. 4

Module 22: Expert Witness

22.0 Expert Witness Pt. 1

22.1 Expert Witness Pt. 2

22.2 Expert Witness Pt. 3

EDUTAINMENT COURSE E-Learning
?Interactive and entertaining talk-show style format presented by industry leading experts.
USD 59
  • 19:59:30
    Hours of learning
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months Access (Unless indicated otherwise)
  • 10-Day money-back guarantee
Back to Top