EC-Council Certified Hacking Forensic Investigator (CHFI)

Kaplan Singapore


Course introduction

Computer hacking forensic investigation is a process to detect hacking attacks and proper extraction of evidences to facilitate investigations. These evidences are very often instrumental for system integrity audits and prevention of similar future cyber-attacks.

As computer crimes are on the rise, good computer forensic practices can help organisations investigate attacks, detect system anomalies, or even help detect systems problems early to prevent future breach and loss of valuable digital assets.



Course Benefits


Course Objectives

The tools and techniques covered in this EC-Council Computer Hacking Forensic Investigator (CHFI) certification course will prepare students with the knowledge to conduct computer investigations with the latest groundbreaking digital forensics technologies.

Upon passing the examination, the CHFI certification awarded to the individual will validate his/her skills to identify intruders’ cyber footprints and gathering of critical evidence to facilitate investigations of crimes and cyber-attacks.

Certification

Upon the successful completion of the exam, you will receive the Computer Hacking Forensic Investigator (CHFI) certificate from EC-Council.



Target Audience


  • Professionals from the Police, Military and related government agencies.
  • IT Professionals who are or specialise in Information System Security, Computer Forensics, Incidence Response, Security Officers, Auditors, Security professionals or/and Site and Web Administrators.
  • Anyone from the general public who is concerned with cyber system security and forensic investigations are also welcome to attend the CHFI course.



Course Outline


Mode of training: Classroom

Duration: 40 hours (5 days)

For latest course schedule, please enquire with your course consultant or simply fill up the enquiry form.

CHFI v9 consists of 14 core modules which is designed for professionals involved with information system security, computer forensics, and incident response.

Course Structure:
Module 1: Computer Forensics in Today’s World
Module 2: Computer Forensics Investigation Process
Module 3: Understanding Hard Disks and File Systems
Module 4: Operating System Forensics
Module 5: Defeating Anti-Forensics Techniques
Module 6: Data Acquisition and Duplication
Module 7: Network Forensics
Module 8: Investigating Web Attacks
Module 9: Database Forensics
Module 10: Cloud Forensics
Module 11: Malware Forensics
Module 12: Investigating Email 
Module 13: Mobile Forensics
Module 14: Investigative Reports



Available Course Sessions


Please click here to stay updated on upcoming sessions.



Trainer Profile


Johnson Yeo and Belly Rachdianto

Johnson Yeo

Having conducted training since 2003, his scope of training is extensive and varied, and it includes topics ranging from Operating Systems, Content Management Servers, Database Servers, Business Process Servers to application development, IT Security as well as IT Process Best Practices like ITIL.

Johnson possesses a strong belief in professionalism; he is well-liked by his students for his ability to conduct class in a lively, engaging and thought-provoking manner. Using real-life examples and use cases, he ensures that his classes are not conducted passively but instead promotes interaction through open-ended questions and sharing.

Belly Rachdianto

• EC-Council Instructor Circle of Excellence Award Winner for 2017
• IT consultant with over 22 years of professional experience and deep knowledge of computer technology and information systems
• Able to engage in system designs, developments and implementations along with multimedia presentations
• Possesses good knowledge of operating systems such as Unix/Linux flavors, Microsoft Windows and Novell Network and internetworking devices, security and multi-service network convergence
• Began his programming work on Commodore, Apple IIe and IBM PC systems in 1984
• Had prior experiences in many large-scale, mission critical projects which required software engineering, system programming, application architecture, network infrastructure and security analysis, network design and implementation, and network management
• Built multiple MIS/GIS applications, OLTP, 3-tier applications, web database, and GIS on the internet
• Delivered information technology courses for various corporate clients in Indonesia, Malaysia, Singapore, Hong Kong, Myanmar, Sri Lanka, Thailand, and Brunei
• Awarded Instructor of the Year in 2014, and Circle of Excellence Instructor for the year 2010, 2011 and 2012 from EC Council

Qualifications
• A+ (IT Technician)
• CCDA (Cisco Certified Design Associate)
• CCNA (Cisco Certified Network Associate)
• CEH (Certified Ethical Hacker)
• CEI (Certified EC Council Instructor)
• CHFI (Certified Hacking Forensic Investigator)
• ECES (EC Council Certified Encryption Specialist)
• ECSA (EC Council Certified Security Analyst)
• ITIL Foundation Certificate (Information Technology Infrastructure Library)
• Licensed Penetration Tester (LPT)
• MCITP (Microsoft Certified Information Technology Professional)
• MCSE (Microsoft Certified Systems Engineer)
• MCT (Microsoft Certified Trainer)
• MCTS (Microsoft Certified Technology Specialist)
• OSCP (Offensive Security Certified Professional)
• OSWP (Offensive Security Wireless Professional)
• SCSAS (Sun Certified Solaris Associate)

Kaplan reserves the right to change trainer, in light of unforeseen circumstances.



 

Top