CHFI-page-banner

This course provides an overview of computer crimes, forensic methods, and laboratories and addresses the tools, techniques, and methods used to perform cyber forensics investigations.

CHFI investigators can draw on an array of methods for discovering data that resides in a computer system or recovering deleted, encrypted, or damaged file information known as computer data recovery.

S2-01

100% Online Course

Study at an Accredited American Online University.

S2-02

3 Months to Complete

The course is covered in 135 hours of deep learning.

S2-03

Hands-on Learning

Get access to the cutting-edge iLabs platform.

S2-04

Shareable Transcript

Receive a transcript upon course completion.

S2-05

Attempt the Certification Exam

Get an EC-Council certificate exam voucher.

Key Highlights of Studying at EC-Council University:

key_frames

Enroll Now

About the program:

Computer crime in today’s cyber world is on the rise. Computer Investigation techniques are being used by police, government, and corporate entities globally. Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.

Computer Security and Computer investigations are changing terms. More tools are invented daily for conducting Computer Investigations, be it computer crime, digital forensics, computer investigations, or even standard computer data recovery. The tools and techniques covered in EC-Council’s CHFI program will prepare the student to conduct computer investigations using ground-breaking digital forensics technologies.

Course Learning Outcomes:

  1. The latest data and statistics on computer forensics.
  2. Special coverage on email, Windows, MAC, Linux, and mobile forensics.
  3. Understand fundamental concepts of incident response and forensic, perform electronic evidence collection, and digital forensic acquisition.
  4. Understand web application forensics and its architecture, interpret the steps for web attacks, Apache web server architecture, and its logs investigation.
  5. Perform mobile forensics and illustrate its architecture, determine mobile storage and its evidence.

Talk to our Admissions Advisor