EC-Council Computer Hacking Forensic Investigator (CHFI) + Voucher d'examen
- Référence CHFI
- Durée 5 jour(s)
- Version 11.0
Modalité pédagogique
Options de paiement complémentaires
-
GTC 40 TTC
Les GTC sont proposés en exclusivité aux partenaires autorisés afin de gagner du temps et de fluidifier le processus d'achat des formations chez Global Knowledge. Il s’agit d’un crédit universel qui peut être utilisé dans les centres Global Knowledge à travers le monde.
Classe inter à distance Prix
EUR3,890.00
hors TVA
Demander une formation en intra-entreprise S'inscrireAller à:
Modalité pédagogique
La formation est disponible dans les formats suivants:
-
Classe inter à distance
Depuis n'importe quelle salle équipée d'une connexion internet, rejoignez la classe de formation délivrée en inter-entreprises.
-
E-Learning
Pour cette formation, il existe aussi un produit d’auto-formation en ligne. Nous consulter.
-
Classe inter en présentiel
Formation délivrée en inter-entreprises. Cette méthode d'apprentissage permet l'interactivité entre le formateur et les participants en classe.
Demander cette formation dans un format différent
Résumé
Haut de pageEC-Council’s C|HFI program prepares cybersecurity professionals with the knowledge and skills to perform effective digital forensics investigations and bring their organization into a state of forensic readiness. Establishing the forensics process, lab, evidence handling procedures, and investigation techniques are required to validate and triage incidents and guide incident response teams in the right direction. Forensic readiness is crucial as it can differentiate between a minor incident and a major cyber-attack that impacts an organization significantly.
This hands-on digital forensics program immerses students in over 68 forensic labs, working on crafted evidence files using tools used by digital forensics professionals. Students go beyond traditional hardware and memory forensics, covering cloud forensics, mobile and IoT forensics, as well as investigations of web application attacks and malware forensics. The C|HFI presents a methodological approach to computer forensics, including searching and seizure, chain of custody, acquisition, preservation, analysis, and reporting of digital evidence.
Students learn various forensic investigation techniques and standard forensic tools. As they learn how to acquire and manage evidence across different operating environments, they also learn chain of custody and legal procedures required to preserve evidence and ensure admissibility in court, supporting the prosecution of cybercriminals and reducing organizational liability.
The program provides credible professional knowledge with globally recognized certification required for a successful digital forensics and DFIR career, thereby increasing employability.
Updated 12/5/2026
Prochaines dates
Haut de page-
- Modalité: Classe inter à distance
- Date: 13-17 juillet, 2026 | 10:00 AM to 6:00 PM
- Centre: SITE DISTANT (W. Europe )
- Langue: Anglais
-
- Modalité: Classe inter à distance
- Date: 03-07 août, 2026 | 9:30 AM to 5:30 PM
- Centre: SITE DISTANT (W. Europe )
- Langue: Français
-
- Modalité: Classe inter à distance
- Date: 17-21 août, 2026 | 9:00 AM to 4:30 PM
- Centre: SITE DISTANT (W. Europe )
- Langue: Néerlandais
-
- Modalité: Classe inter à distance
- Date: 14-18 septembre, 2026 | 9:00 AM to 5:00 PM
- Centre: SITE DISTANT (W. Europe )
- Langue: Anglais
- Version: 10
-
- Modalité: Classe inter à distance
- Date: 12-16 octobre, 2026 | 10:00 AM to 6:00 PM
- Centre: SITE DISTANT (W. Europe )
- Langue: Anglais
-
- Modalité: Classe inter à distance
- Date: 02-06 novembre, 2026 | 9:30 AM to 5:30 PM
- Centre: SITE DISTANT (W. Europe )
- Langue: Français
Public
Haut de pageIT/forensics professionals with basic knowledge of IT/cybersecurity, computer forensics, incident response, and threat vectors.
Objectifs de la formation
Haut de pageWhat will you learn?
- Computer forensics fundamentals, different types of cybercrimes and their investigation procedures, and regulations and standards that influence computer forensics investigation
- Various phases involved in the computer forensics investigation process
- Different types of disk drives and their characteristics, booting process and file systems in Windows, Linux, and Mac operating systems, file system examination tools, RAID and NAS/SAN storage systems, various encoding standards, and file format analysis
- Data acquisition fundamentals and methodology, eDiscovery, and preparation of image files for forensic examination
- Various anti-forensics techniques used by attackers, methods to detect them, related tools, and countermeasures
- Volatile and non-volatile data acquisition in Windows-based operating systems, Windows memory and registry analysis, electron application analysis, web browser forensics, examination of Windows files, ShellBags, LNK files, Jump Lists, and Windows event logs
- Volatile and non-volatile data acquisition and memory forensics in Linux and Mac operating systems
- Network forensics fundamentals, event correlation concepts, Indicators of Compromise (IOCs), identification from network logs, network traffic investigation techniques and tools, incident detection and examination, and wireless attack detection and investigation
- Malware forensics concepts, static and dynamic malware analysis, system and network behavior analysis, and ransomware analysis
- Web application forensics and challenges, web application threats and attacks, web application logs (IIS logs, Apache web server logs, etc.), and detection and investigation of web application attacks
- Tor browser working methodology and steps involved in Tor browser forensics
- Cloud computing concepts, cloud forensics, and challenges, fundamentals of AWS, Microsoft Azure, and Google Cloud and their investigation processes
- Components in email communication, steps in email crime investigation, and social media forensics
- Architectural layers and boot processes of Android and iOS devices, mobile forensics process, cellular networks, SIM file system, and logical and physical acquisition of Android and iOS devices
- Different types of IoT threats, security problems, vulnerabilities and attack surface areas, and IoT forensics process and challenges
Programme détaillé
Haut de pageModule 01 Computer Forensics in Today's World
Module 02 Computer Forensics Investigation Process
Module 03 Understanding Hard Disks and File Systems
Module 04 Data Acquisition and Duplication
Module 05 Defeating Anti-forensics Techniques
Module 06 Windows Forensics
Module 07 Linux and Mac Forensics
Module 08 Network Forensics
Module 09 Malware Forensics
Module 10 Investigating Web Attacks
Module 11 Dark Web Forensics
Module 12 Cloud Forensics
Module 13 Email and Social Media Forensics
Module 14 Mobile Forensics
Module 15 IoT Forensics
Pré-requis
Haut de pageAttendees should meet the following prerequisites:
- Basic knowledge of IT/cybersecurity, computer forensics, incident response, and threat vectors.
Certification
Haut de pageRecommended as preparation for the following exams:
- 312-49 - CHFI Exam
Examination
Number of Questions: 150
Duration: 4 hours
Availability: ECC Exam Portal