Computer Hacking Forensic Investigator V11

Digital Forensics – The Need of the Hour Amidst Escalating Threats.

In 2022, phishing topped the cybercrimes reported to the U.S. Internet Crime Complaint Center, affecting about 300,497 individuals, with nearly 58,859 personal data breaches reported. As per the 2022 Internet Crime Report, investment fraud led to the highest financial losses for individuals in the U.S., totaling over $3.3 billion. Business email compromise (BEC) followed with reported losses of around $2.7 billion, while victims of tech support fraud reported losses of $806 million. The global average cost of a data breach in 2023 was $4.45 million, a 15% increase over three years, as per the Cost of Data Breach Report 2023.

Why is Digital Forensics Crucial For Organizations & Professionals?

No cybersecurity team is complete without digital forensics. Digital forensics and investigations are critical to successfully handling a cyber incident when it occurs. A breach can be brutal; investing in building an expert in-house forensics team with C|HFI training is a strategic move for enterprises looking to safeguard their stakeholder’s interests as well as theirs. The C|HFI empowers the existing team by applying the latest investigation practices.

What is the Computer Hacking Forensic Investigator (C|HFI) Program?

EC-Council’s C|HFI program prepares cybersecurity professionals with the knowledge and skills to perform effective digital forensics investigations and bring their organisation into a state of forensic readiness. This includes establishing the forensics process, lab and evidence handling procedures, as well as the investigation procedures required to validate/triage incidents and point the incident response teams in the right direction. Forensic readiness is crucial as it can differentiate between a minor incident and a major cyber-attack that brings a company to its knees.

This intense hands-on digital forensics program immerses students in over 68 forensic labs, enabling them to work on crafted evidence files and utilise the tools employed by the world’s top digital forensics professionals. Students will go beyond traditional hardware and memory forensics and learn current topics such as cloud forensics, mobile and IoT, investigating web application attacks, and malware forensics.

The C|HFI presents a methodological approach to computer forensics, including searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence. Students learn how to acquire and manage evidence through various operating environments, as well as the chain of custody and legal procedures required to preserve evidence and ensure it is admissible in court. This knowledge will help them prosecute cybercriminals and limit liability for target organisations. The program provides credible professional knowledge with a globally recognized certification required for successful digital forensics and DFIR careers, thus increasing your employability.

Course Modules

● Computer Forensics in Today’s World
● Computer Forensics Investigation Process
● Understanding Hard Disks and File Systems
● Data Acquisition and Duplication
● Defeating Anti-Forensics Techniques
● Windows Forensics
● Linux and Mac Forensics
● Network Forensics
● Malware Forensics
● Investigating Web Attacks
● Dark Web Forensics
● Cloud Forensics
● Email and Social Media Forensics
● Mobile Forensics
● IoT Forensics15

What Will You Learn?

  • Computer forensics fundamentals, different types of cybercrimes and their investigation procedures, regulations & standards that influence computer forensics investigation, phases, process.
  • Different types of disk drives, their characteristics, booting process & file systems in Windows, Linux, Mac OS, file system examination tools, RAID & NAS/SAN storage systems, encoding standards, file format analysis
  • Data acquisition fundamentals & methodology, eDiscovery, preparing image files for forensics examination
  • Various anti-forensics techniques used by attackers, different ways to detect & related tools, countermeasures
  • (non)Volatile data acquisition in Windows-based OS, memory/registry analysis, electron application analysis, web-browser forensics, examination of Windows files, ShellBags, LNK files, jump lists, Windows event logs
  • Volatile and non-volatile data acquisition and memory forensics in Linux and Mac operating systems
  • Network forensics fundamentals, event correlation concepts, Indicators of Compromise (IOCs), ways to identify through network logs, techniques/tools related to network traffic investigation, incident detection/ examination, wireless attack detection/investigation.
  • Malware forensics concepts, Analysis of static/ dynamic malware, system/ network behaviour, ransomware
  • Web application forensics and challenges, web application threats and attacks, web application logs (IIS logs, Apache web server logs, etc.), how to detect & investigate various web application attacks
  • Tor browser working methodology and steps involved in the Tor browser forensics process
  • Cloud concepts, forensics, challenges, fundamentals/investigation processes of AWS, MS-Azure, Google Cloud
  • Components in email communication, steps involved in email crime
  • Investigation, and social media forensics
  • IoT threats types, security problems, vulnerabilities/ attack surfaces areas, IoT forensics processes/ challenges
  • Architectural layers and boot processes of Android and iOS devices, mobile forensics process, various cellular networks, SIM file system, and logical and physical acquisition of Android and iOS devices.