Course Description

CHFI v8 Program certifies individuals in the specific security discipline of computer forensics from a vendor-neutral view. The CHFI certification will assure the application knowledge of those who are concerned about the integrity of the network infrastructure for example law enforcement personnel, system administrators, security officers, defence and military personal, legal professionals, bankers, security professional.

About the Exam

  • Number of Questions: 150
  • Test Duration: 4 hours
  • Passing Score: 70%
  • Test Format: Multiple choice

More Information

Target Audience

The CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident response.

  • Police and other law enforcement personnel
  • Defense and Military personnel
  • e-Business Security professionals
  • Systems administrators
  • Legal professionals
  • Banking, Insurance and other professionals
  • Government agencies
  • IT manager

More Information


A CHFI v8 certified professional will be able to understand:

  • The procedure of examining cyber-crime, concerned laws, and the all the particulars in acquiring a search warrant.
  • Various digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category
  • Roles of first responder, first responder tool kit, securing and assessing electronic crime scene, carrying out preliminary interviews, documenting electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, reporting the crime scene
  • How to recover deleted files and deleted partitions in Windows, Mac OS X, and Linux
  • The process involved in forensic investigation using Access Data FTK and secure Steganography and its techniques, Steganalysis, and image file forensics
  • Password Cracking ideas, tools, types of password attacks and how to investigate password protected file breach
  • Various types of log capturing techniques, log management, time synchronization, log capturing tools
  • The way of investigating logs, network traffic, wireless attacks, and web attacks
  • The way of tracking e-mails and e-mail crimes and etc.

More Information

Legal Agreement

Computer forensics is simply the application of computer investigation and analysis techniques to gather legal evidence. Evidence might require in various computer crimes or misuse, including but not limited to theft of trade secrets, theft of or damage of intellectual property, and dupe. Computer forensic investigators can frame out different methods for discovering data that exists in a computer system, or recovering deleted, encrypted, or damaged file information.

The CHFI course will educate individuals the skills to identify an intruder’s footprints and collect the necessary proof to take legal action. The course teaches different tools of today’s top tools of the forensic trade including software, hardware and specialized methods. The rise of new type of crime the ‘cyber crime’ both in businesses and at home user rise the need to become more efficient and integrated with one another. Today in the world the battles are fought not only among countries but also in the technical realm. It is the utmost requirement for you or your organization to gain the knowledge or skills to identify, track, and prosecute the cyber-criminal. This course is the right choice for you if you really want to win over this new way of crime.

More Information

For More Career Path Courses From EC-Council Please Download CERTIFICATION TRACK

Join Us

Let us know you ! Please fill the form so that we can understand you better.

Get Started