Computer Hacking Forensic Investigator

CHFI v10 Certification Exam Prep

with

 
 
 

About the Program

This online program includes training for the EC-Council Computer Hacking Forensic Investigator (CHFIv10) and CompTIA PenTest+ certification exams. The courses are designed to prepare you for a successful career in cybersecurity.

EC-Council Computer Hacking Forensic Investigator

EC-Council’s Certified Hacking Forensic Investigator (CHFIv10) is the only comprehensive ANSI accredited, lab-focused program in the market that gives organizations vendor-neutral training in digital forensics. CHFI provides its attendees with a firm grasp of digital forensics, presenting a detailed and methodological approach to digital forensics and evidence analysis that also pivots around Dark Web, IoT, and Cloud Forensics. The tools and techniques covered in this program will prepare the learner for conducting digital investigations using ground-breaking digital forensics technologies.

The program is designed for IT professionals involved with information system security, computer forensics, and incident response. It will help fortify the application knowledge in digital forensics for forensic analysts, cybercrime investigators, cyber defense forensic analysts, incident responders, information technology auditors, malware analysts, security consultants, and chief security officers.

The program equips candidates with the necessary skills to proactively investigate complex security threats, allowing them to investigate, record, and report cybercrimes to prevent future attacks.

  • Who is the training for?

    The CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident response.

    • Police and other law enforcement personnel

    • Defense and Security personnel

    • e-Business Security professionals

    • Legal professionals

    • Banking, Insurance, and other professionals

    • Government agencies

    • IT managers

    • Digital Forensics Service Providers

    How will you benefit from this training?

    A breach be  brutal. Investing in building an expert in-house forensics team with CHFI training and certification is a strategic move for enterprises looking to safeguard their stakeholders’ interests as well as their own. CHFI empowers their existing team with learning the latest investigation practices.

    • The course aligns with all the crucial forensic job roles across the globe.

    • It is an ANSI 17024 accredited Certification Program, mapped to the NICE 2.0 framework.

    • The course focuses on the latest technologies including IoT Forensics, Dark Web Forensics, Cloud Forensics (including Azure and AWS), Network Forensics, Database Forensics, Mobile Forensics, Malware Forensics (including Emotet and Eternal Blue), OS Forensics, RAM forensics and Tor Forensics, CHFI v10 covers the latest tools, techniques, and methodologies along with ample crafted evidence files.

    Detailed Methodological Learning Approach- CHFI presents a methodological approach to computer forensic including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence.

    Dark Web & IoT Forensics- The first certification program to offer  you  Dark Web and IoT Forensics modules.

    Extensive Coverage on Malware Forensics- Covers latest malware samples like Emotet and Eternal Blue, also known as WannaCry.

    Forensic Methodologies for Cloud Infrastructure- Master tools and techniques to ensure security across various cloud platforms — Amazon Web Services, Microsoft Azure Cloud, and Google Cloud Platform.

    50 GB of Crafted Evidence Files- CHFI v10 provides you with 50 GB of crafted evidence files for investigation purposes which helps to have hands-on experience in evidence collection.

    50+ Complex Labs- The only program that provides thorough learning with a simulated environment with 50+ complex labs to ensure you obtain must have skills for your next job.

    • Forensic Computer Analyst

    • Computer Forensics Criminal Investigator

    • Intelligence Technology Analyst

    • Disaster Recovery Expert

    • Cryptographer

    • Cryptanalyst

    • Computer Crime Investigator

    • Mobile Forensics Expert

    • Information Technology Auditor

    • Digital Crime Specialist

    • Cyber Defense Forensic Analyst

    • Forensic Analyst

    • Cyber Crime Investigator

    • Information Systems Security Professional

    • Forensic Accountant

    • Information Security Analyst

    • Malware Analyst

    • Computer Forensics Examiner

    • Security Consultant

    • Computer Forensics Technician

  • The CHFI certification is awarded after successfully passing exam EC0 312-49. CHFI EC0 312-49 exams are available at ECC exam centers around the world.

    Number of Questions: 150

    Test Duration: 4 hours

    Test Format: Multiple Choice

    Test Delivery: ECC exam portal

    Passing Score

    In order to maintain the high integrity of our certification exams, EC-Council Exams are provided in multiple forms (i.e., different question banks). Each form is carefully analyzed through beta testing with an appropriate sample group under the purview of a committee of subject matter experts, ensuring that each of our exams is not only academically sound, but also has “real world” applicability. We apply an internal process to determine the difficulty rating of each question. The individual rating then contributes to an overall “Cut Score” for each exam form. To ensure each form has equal assessment standards, cut scores are set on a “per exam form” basis. Depending on which exam form is challenged, cut scores can range from 60% to 85%.

    Clause: Age Requirements and Policies Concerning Minors

    The age requirement for attending the training or the exam is restricted to any candidate that is permitted by his/her country of origin/residency.

    If the candidate is under the legal age as permitted by his/her country of origin/residency, they are not eligible to attend the official training or eligible to attempt the certification exam unless they provide the accredited training center/EC-Council a written consent/indemnity of their parent/legal guardian and a supporting letter from their institution of higher learning. Only candidates from a nationally accredited institution of higher learning shall be considered.

CompTIA Pentest+

CompTIA PenTest+ is for cybersecurity professionals tasked with penetration testing and vulnerability management.

  • Why is PenTest+ Different?

    • CompTIA PenTest+ is the most comprehensive exam covering all penetration testing stages. Unlike other penetration testing exams that only cover a portion of stages with essay questions and hands-on, PenTest+ uses both performance-based and knowledge-based questions to ensure all stages are addressed.

    • PenTest+ is the only exam on the market to include all aspects of vulnerability management. It not only covers hands-on vulnerability assessment, scanning, and analysis, but also includes planning, scoping, and managing weaknesses, not just exploiting them.

    • PenTest+ is the most current penetration testing exam covering the latest techniques against expanded attack surfaces. It is a unique exam that requires a candidate to demonstrate the most relevant pen testing skills for the cloud, hybrid environments, web applications, Internet of Things (IoT), and traditional on-premises.

    What Skills Will You Learn?

    • Planning and Scoping- Includes updated techniques emphasizing governance, risk, and compliance concepts, scoping and organizational/customer requirements, and demonstrating an ethical hacking mindset.

    • Reporting and Communication- Expanded to focus on the importance of reporting and communication in an increased regulatory environment during the pen testing process through analyzing findings and recommending appropriate remediation within a report.

    • Information Gathering and Vulnerability Scanning- Includes updated skills on performing vulnerability scanning and passive/active reconnaissance, vulnerability management, as well as analyzing the results of the reconnaissance exercise.

    • Tools and Code Analysis- Includes updated concepts of identifying scripts in various software deployments, analyzing a script or code sample, and explaining use cases of various tools used during the phases of a penetration test. It is important to note that no scripting and coding is required.

    • Attacks and Exploits- Includes updated approaches to expanded attack surfaces, researching social engineering techniques, performing network attacks, wireless attacks, application-based attacks and attacks on cloud technologies, and performing post-exploitation techniques.

    • Penetration Tester

    • Security Consultant

    • Cloud Penetration Tester

    • Web App Penetration Tester

    • Cloud Security Specialist

    • Network & Security Specialist

  • The CompTIA PenTest+ will certify the successful candidate has the knowledge and skills required to plan and scope a penetration testing engagement including vulnerability scanning, understand legal and compliance requirements, analyze results, and produce a written report with remediation techniques.

    Number of Questions: Maximum of 85 questions

    Type of Questions: Performance-based and multiple choice

    Duration: 165 Minutes

    Passing Score: 750 (on a scale of 100-900)

    Recommended Experience: Network+, Security+ or equivalent knowledge. Minimum of 3-4 years of hands-on information security or related experience. While there is no required prerequisite, PenTest+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.

    Testing Provider: Pearson VUE


Tuition & Program Info

To learn more about ETI’s tuition and financial aid options, click here.

$3,997

This is a self-paced program. Self-paced programs create a unique learning experience that allows students to learn independently and at a pace that best suits them.

Duration: 16 Weeks

Students have full online access to the program for 1 year.

Exam Vouchers are Included with Tuition

Program Includes:

  • CompTIA PenTest+

    • E-books

    • Virtual practice labs

    • Mentoring

    • Bootcamps (optional live, instructor-led sessions that include program review, additional information, and Q&As)

    • Test review questions

  • EC-Council CHFI

    • Official e-courseware (1 year access)

    • CyberQ Labs (6 Months Access)

    • Certificate of Completion from EC-Council

    • CHFI (Practical) - iLearn Add On

    • CodeRed (12-month Subscription)

      • 4000+ Premium Videos

      • New courses and content added weekly

      • Courses contain an abundance of demo lab videos that dive deeper into important cyber concepts

    • CHFI Textbook (Ships to US, Canada, & Australia Only)


Course Breakdown

    • Mentoring PT0-001 CompTIA PenTest+: mentors are available to help students with their studies. Students can reach them by entering a Mentored Chat Room or by using the Email My Mentor service.

    • Planning for an Engagement

    • Scoping an Engagement

    • Information Gathering

    • Vulnerability Identification

    • Social Engineering and Specialized System Attacks

    • Network-Based Exploits

    • Application-Based Vulnerabilities

    • Local Host Vulnerabilities

    • Post-Exploitation and Facilities Attacks

    • Penetration Testing Tools

    • Analyzing Tool and Script Output

    • Reporting and Communication

    REFERENCE MANUAL: CompTIA PenTest+ Certification Practice Exams (Exam PT0-001)

  • Module 01: Computer Forensics in Today’s World

    Module 02: Computer Forensics Investigation Process

    Module 03: Understanding Hard Disks and File Systems

    Module 04: Data Acquisition and Duplication

    Module 05: Defeating Anti-Forensics Techniques

    Module 06: Windows Forensics

    Module 07: Linux and Mac Forensics

    Module 08: Network Forensics

    Module 09: Investigating Web Attacks

    Module 10: Dark Web Forensics

    Module 11: Database Forensics

    Module 12: Cloud Forensics

    Module 13: Investigating Email Crimes

    Module 14: Malware Forensics

    Module 15: Mobile Forensics

    Module 16: IoT Forensics