Maxtrain.com - [email protected] - 513-322-8888 - 866-595-6863


Computer Hacker Forensic Investigator

Alert Me


Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client`s systems, to tracing the originator of defamatory emails, to recovering signs of fraud.

The CHFI course will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the “cyber-criminal.” It is no longer a matter of “will your organization be compromised (hacked)?” but, rather, “when?” Today’s battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal , then this is the course for you.

The CHFI is a very advanced security-training program. Proper preparation is required before conducting the CHFI class.

After taking this course, students will have the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute.


Lesson 1: Computer Forensics in Today's World

Lesson 2: Computer Forensics Investigation Process

Lesson 3: Searching and Seizing of Computers

Lesson 4: Digital Evidence

Lesson 5: First Responder Procedures

Lesson 6: Computer Forensics Lab

Lesson 7: Understanding Hard Disks and File Systems

Lesson 8: Windows Forensics

Lesson 9: Data Acquisition and Duplication

Lesson 10: Recovering Deleted Files and Deleted Partitions

Lesson 11: Forensics Investigations Using AccessData FTK

Lesson 12: Forensics Investigations Using Encase

Lesson 13: Steganography and Image Files Forensics

Lesson 14: Application Password Crackers

Lesson 15: Log Capturing and Event Correlation

Lesson 16: Network Forensics, Investigating Logs and Investigating Network Traffic

Lesson 17: Investigating Wireless Attacks

Lesson 18: Investigating Web Attacks

Lesson 19: Tracking Emails and Investigating Email Crimes

Lesson 20: Mobile Forensics

Lesson 21: Investigative Reports

Lesson 22: Becoming an Expert Witness


Ethical Hacking and Countermeasures (CEH) Certification


Police and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies, IT managers, Forensic Investigators, Programmers, IT Security Professionals, IT Managers.


*This course is offered through Epic Learning Partners (Centriq Training), an EC-Council Authorized Training Center







5 Days Course

Class Dates

Request a Date or a Private Class below.

Loading ...