COMPUTER HACKING FORENSIC INVESTIGATOR V11
Digital Forensics—The Need of the Hour
Amidst Escalating Threats
In 2022, phishing topped the cybercrimes reported to the U.S. Internet Crime Complaint Center,
affecting about 300,497 individuals, with nearly 58,859 personal data breaches reported. [1]
As per the 2022 Internet Crime Report, investment fraud led to the highest financial losses for
individuals in the U.S., totaling over $3.3 billion. Business email compromise (BEC) followed with
reported losses of around $2.7 billion, while victims of tech support fraud reported losses of $806
million. [2]
The global average cost of a data breach in 2023 was $4.45 million, a 15% increase over three years,
as per the Cost of Data Breach Report 2023. [3]
Why is Digital Forensics Crucial
For Organizations And Professionals?
No cybersecurity team is complete without digital forensics. Digital forensics and investigations are
critical to successfully handling a cyber incident when it occurs.
A breach can be brutal; investing in building an expert in-house forensics team with C|HFI training is
a strategic move for enterprises looking to safeguard their stakeholder's interests as well as theirs.
The C|HFI empowers the existing team by applying the latest investigation practices.
The C|HFI Boosts Investigative Forensics Skills
and Builds Organization Forensic Readiness
Successful Minimized Faster Detection Regulatory Reduced
Security Cost Of Cyber And Mitigation Compliance and Insurance
Operations Investigations Of Attack Reduced Premiums
With Proof Vectors Regulatory Costs
01
COMPUTER HACKING FORENSIC INVESTIGATOR V11
Demand for Digital Forensics Professionals
The U.S. Bureau of Labor Statistics projects that the employment of forensic science technicians is
projected to grow 13% from 2022 to 2032, much faster than the average for all occupations.
What is the Computer Hacking Forensic
Investigator (C|HFI) Program?
EC-Council's C|HFI program prepares cybersecurity professionals with the knowledge and skills to
perform effective digital forensics investigations and bring their organization into a state of forensic
readiness. This includes establishing the forensics process, lab and evidence handling procedures, as
well as the investigation procedures required to validate/triage incidents and point the incident
response teams in the right direction. Forensic readiness is crucial as it can differentiate between a
minor incident and a major cyber-attack that brings a company to its knees.
This intense hands-on digital forensics program immerses students in over 68 forensic labs, enabling
them to work on crafted evidence files and utilize the tools employed by the world's top digital
forensics professionals. Students will go beyond traditional hardware and memory forensics and
learn current topics such as cloud forensics, mobile and IoT, investigating web application attacks,
and malware forensics. The C|HFI presents a methodological approach to computer forensics,
including searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting
of digital evidence.
Students learn how to acquire and manage evidence through various operating environments, as
well as the chain of custody and legal procedures required to preserve evidence and ensure it is
admissible in court. This knowledge will help them prosecute cybercriminals and limit liability for
target organizations.
The program provides credible professional knowledge with a globally recognized certification
required for successful digital forensics and DFIR careers, thus increasing your employability.
02
C|HFI Course Modules:
0 1 Computer Forensics in Today's World
0 2 Computer Forensics Investigation Process
03 Understanding Hard Disks and File Systems
04 Data Acquisition and Duplication
05 Defeating Anti-Forensics Techniques
06 Windows Forensics
07 Linux and Mac Forensics
08 Network Forensics
09 Malware Forensics
10 Investigating Web Attacks
11 Dark Web Forensics
12 Cloud Forensics
13 Email and Social Media Forensics
14 Mobile Forensics
15 IoT Forensics
What Will You Learn?
01 Computer forensics fundamentals, different types of cybercrimes and their investigation
procedures, and regulations and standards that influence computer forensics investigation
02 Various phases involved in the computer forensics investigation process
03 Different types of disk drives and their characteristics, booting process and file systems
in Windows, Linux, and Mac operating systems, file system examination tools, RAID
and NAS/SAN storage systems, various encoding standards, and file format analysis
04 Data acquisition fundamentals and methodology, eDiscovery, and how to prepare image
files for forensics examination
05 Various anti-forensics techniques used by attackers, different ways to detect them
and related tools, and countermeasures
06 Volatile and non-volatile data acquisition in Windows-based operating systems, Windows
memory and registry analysis, electron application analysis, web browser forensics,
and examination of Windows files, ShellBags, LNK files, jump lists, and Windows event logs
Volatile and non-volatile data acquisition and memory forensics in Linux and
07
Mac operating systems
08 Network forensics fundamentals, event correlation concepts, Indicators of Compromise (IOCs)
and ways to identify them from network logs, techniques and tools related to network traffic
investigation, incident detection and examination, and wireless attack detection and investigation
09 Malware forensics concepts, static and dynamic malware analysis, system and network
behavior analysis, and ransomware analysis
10 Web application forensics and challenges, web application threats and attacks, web application
logs (IIS logs, Apache web server logs, etc.), and how to detect and investigate various
web application attacks
11 Tor browser working methodology and steps involved in the Tor browser forensics process
12 Cloud computing concepts, cloud forensics and challenges, fundamentals of AWS,
Microsoft Azure, and Google Cloud and their investigation processes
13 Components in email communication, steps involved in email crime investigation,
and social media forensics
14 Architectural layers and boot processes of Android and iOS devices, mobile forensics
process, various cellular networks, SIM file system, and logical and physical acquisition
of Android and iOS devices
15 Different types of IoT threats, security problems, vulnerabilities and attack surfaces areas,
and IoT forensics processes and challenges
Key Features and Critical Components
of the C|HFI Program
Master a methodological forensics framework approach
for performing digital forensics investigation
Documenting Search and Evidence Data
the Crime Scene Seizure Preservation Acquisition
Data Data
Reporting
Acquisition Examination
15 modules 2100+ 1550+ 68
covering core pages of the pages of lab manual hands-on
labs
domains of digital comprehensive covering detailed lab
forensics student manual scenarios and instructions
600+ 100% 70+ GB
digital forensics compliance with of crafted evidence files
tools NICE Special Publication for investigation purposes
800-181 cybersecurity
workforce framework
40% Approved by the Accredited by the
of training time US Department ANAB
dedicated to labs of Defense (DoD) ISO/IEC 17024
under Directive 8570/8140 National Accreditation Board
Covers relevant knowledge bases and skills to meet regulatory
compliance standards such as ISO 27001, PCI DSS, SOX, HIPPA, etc.
05
COMPUTER HACKING FORENSIC INVESTIGATOR V11
Key Benefits of the C|HFI Program
Master a methodological forensics framework approach for
1 performing digital forensics investigation:
1. Documenting the Crime Scene 2. Search and Seizure
3. Evidence Preservation 4. Data Acquisition 5. Data Examination 6. Reporting
The C|HFI training program teaches evidence collection, analysis, and preservation of digital
evidence. Learners are guided through a step-by-step process that adheres to industry best practices.
This structured methodology enhances the efficiency and effectiveness of digital investigations and
ensures the integrity and admissibility of the collected evidence.
Build skills for investigating diverse types of digital forensic
2 investigations:
Students in this training program delve into the intricacies of digital evidence examination, analysis,
and preservation across various contexts. The curriculum emphasizes hands-on experience, allowing
learners to navigate real-world situations commonly encountered in computer forensics. C|HFI
training empowers individuals to become adept and capable of addressing the evolving challenges of
the cybersecurity landscape.
70+ GB of crafted evidence files for
3 investigation purposes:
The C|HFI training goes above and beyond by providing participants with an invaluable resource –
more than 70 GB of meticulously crafted evidence files tailored for investigation purposes. This
extensive collection serves as a practical and hands-on supplement to the theoretical aspects of the
training. Learners can immerse themselves in a diverse range of simulated scenarios, each designed
to replicate real-world digital forensics challenges.
Gain in-depth knowledge in volatile and non-volatile data
4 acquisition and examination of Mac operating systems and also
RAM forensics, Tor forensics, etc.:
Including volatile and non-volatile data acquisition and examining the Mac Operating System in the
C|HFI course is paramount. It enhances the comprehensiveness of the training, preparing individuals
to navigate the complexities of Mac-based digital forensics scenarios with precision and expertise,
thereby expanding their capabilities in the evolving landscape of computer forensics.
06
COMPUTER HACKING FORENSIC INVESTIGATOR V11
Become proficient in malware forensics process and malware
5 analysis, including the latest analysis: BlackCat (ALPHV):
This focused training ensures that students develop expertise in unraveling the complexities of
malware, including the latest variants like BlackCat. By delving into the intricacies of malware
forensics, learners are equipped with the skills to detect, analyze, and respond to evolving cyber
threats, enhancing their proficiency in safeguarding digital environments against malicious
activities.
Learn social media forensics and
6 wireless network forensics:
By focusing on social media forensics, the course enhances professionals' capabilities to uncover
relevant information, detect cyber threats, and conduct thorough digital investigations in the
context of social media interactions. This specialized training ensures that participants gain
expertise in analyzing wireless network traffic, identifying security vulnerabilities, and conducting
forensic examinations in wireless environments.
Learn electron application and web
7 browser forensics:
By focusing on electron application forensics, the course prepares professionals to navigate the
complexities of these modern applications, enhancing their ability to uncover digital evidence,
analyze potential security risks, and contribute effectively to digital forensic investigations in the
evolving realm of software development.
By focusing on web browser forensics, the course equips professionals with the knowledge to trace
online behaviors, detect potential threats, and conduct thorough digital investigations, contributing
to a comprehensive skill set in computer forensics.
Gain in-depth skills in mobile
8 forensics analysis:
With the ubiquity of mobile devices, understanding the nuances of forensic investigation specific to
smartphones is crucial. This specialized training ensures that participants acquire the skills to extract
and analyze digital evidence from mobile devices comprehensively.
07
COMPUTER HACKING FORENSIC INVESTIGATOR V11
Learn how to perform digital forensics investigation through
9 Python scripting:
The C|HFI training ensures that participants understand the theoretical aspects of digital forensics
and gain practical skills in automating and enhancing investigative processes using Python scripts. By
incorporating this focus, the course equips professionals to streamline tasks, analyze data more
effectively, and adapt to the evolving demands of digital investigations, highlighting the significance
of coding skills in computer forensics.
Master a unique skill set with C|HFI - the first certification to
10 offer dark web & IoT forensics:
In dark web forensics, C|HFI students will learn to acquire the suspect machine's memory dumps and
local storage image files, examine memory dumps and local storage image files for illegal activities
taking place using emails, and retrieve accessed emails and email attachments.
In IoT forensics, students will learn to perform logical and physical acquisition on Android wear and
retrieve potential evidence. Perform client-based and cloud-based analysis on Amazon Alexa devices
to discover artifacts stored on the device.
Become skilled in forensic methodologies for cloud
11 infrastructure (AWS, Azure and GCP):
The C|HFI training ensures that participants gain proficiency in navigating the complexities of major
cloud platforms (AWS, Azure, and GCP), allowing them to conduct thorough digital forensic
examinations in cloud-based scenarios. The inclusion of cloud-specific methodologies broadens the
skill set of digital forensic professionals.
Learn techniques such as defeating anti-forensic techniques,
12 Windows ShellBags, etc.:
In learning techniques such as defeating anti-forensic methods, Windows ShellBags, analyzing LNK
files, and jump lists, you acquire advanced skills in digital forensics. This includes understanding
methods to counter attempt, conceal, or manipulate digital evidence, exploring the intricacies of
Windows file system artifacts like ShellBags and LNK files, and utilizing jump lists for detailed
timeline analysis, enhancing your proficiency in forensic investigations.
08
COMPUTER HACKING FORENSIC INVESTIGATOR V11
Learn the latest digital forensics tools/platforms
13 and frameworks:
The C|HFI course includes a library of tools, platforms, and frameworks across different operating
platforms required by security professionals/computer forensic analysts to perform an effective
organizational digital forensics investigation. This gives students a wider range of options than any
other program on the market.
40% of training time is dedicated to lab training that simulates
14 real-life networks and platforms:
The theory-to-practice ratio in the C|HFI program is 60:40, providing students with real-time
experience and hands-on practice with the latest digital forensic tools, techniques, methodologies,
scripts, and frameworks. The C|HFI is integrated with labs to emphasize the learning objectives. The
lab environment simulates a real-time situation for computer forensic analysts, and this experience
can help in effectively identifying and mitigating various business risks by successfully carrying out a
computer forensic investigation, leading to the prosecution of perpetrators.
The C|HFI is designed by SMEs and digital forensics
15 practitioners worldwide after a rigorous JTA of the job roles
involved in the field of digital forensics, increasing your
employability:
The C|HFI was developed by top-notch digital forensics practitioners and experts in the domain
through rigorous industry-wide JTA. It was developed after intensive analysis of all possible
combinations of Task, Knowledge, Skill, and Ability (TKSA) from relevant job postings of various
multinational companies. This comprehensive mapping/analysis synchronizes the C|HFI program to
industry-wide computer forensic analyst job requirement criteria, thus increasing your employability.
09
COMPUTER HACKING FORENSIC INVESTIGATOR V11
Training and Exam Details
Training Details:
iLearn (Self-Study) Week (Live Online)
This solution is an asynchronous, This solution is a live, online,
self-study environment in a video instructor-led training format.
streaming format.
Training Partner (In Person)
This solution offers "in-person" training so that
you can benefit from collaborating with your
peers and gaining real-world led by expert,
certified instructors.
Exam Title:
Computer Hacking Forensic Investigator
Exam Code: Number of Questions: Duration: Availability:
312-49 150 4 hours ECC EXAM
Portal
Who Can Apply? Salaries
Recommended Prerequisites for the C|HFI: As per the Salary Survey 75 Report,
IT/Forensics professionals with basic EC-Council's C|HFI is the only Digital
knowledge of IT/cybersecurity, computer Forensics certification with a six-digit salary
forensics, incident response, and threat of up to $117,950.
vectors.
10
COMPUTER HACKING FORENSIC INVESTIGATOR V11
Recognition/Endorsement/Mapping
U.S. Department
of Defense
Why Do Top DFIR & Digital Forensics Professionals
Across the Globe Prefer the the C|HFI Program?
The C|HFI certification gives a comprehensive overview of the
process that a forensic investigator must follow when
investigating a cybercrime. It includes the right treatment of the
digital evidence to be accepted in the courts and useful tools and
techniques that can be applied to investigate an incident.
Virginia Aguilar,
Google, EX-KPMG
Madrid
11
COMPUTER HACKING FORENSIC INVESTIGATOR V11
The C|HFI provides a very streamlined and step-by-step forensics
methodology from a very agnostic perspective. Yet, it still covers
some key environments and platforms in detail, such as cloud
environments, mobile devices, databases, and network devices.
The program is very detailed in its coverage and explanation of the
forensics tool. But at the same time, it's also very simplified, so
anyone new to forensics can benefit from it. Also, the lab format
was easy to comprehend and follow for those new to
cybersecurity. The C|HFI program is very organized in its approach
and presentation, making it easier for me to retain information
Grace Pittmon
long after completing the course. For those looking to advance
Navitus Health
their careers in cybersecurity, it's a good set of skills to showcase
Solutions
the value you will provide to an employer regardless of the career
IT Security Manager
path you're pursuing. Whether you're interested in the strategic
side of the house, meaning executive roles, or whether you want to
move to or advance in the tactical or operational side of
cybersecurity, C|HFI can be the best one for you!
The Computer Hacking Forensic Investigator (C|HFI) certification
has been instrumental in assuring both my company and our
clients that my skillset is among the elite in the cybersecurity and
response profession. The C|HFI allows my company to readily
identify to our DoD clients that our team is trained to perform the
rigorous functions required of a cyber threat response team. Our
company can better brand our capability to investigate cyber
security incidents, perform computer/malware forensic analysis,
identify active threats, and report findings.
Brad W. Beatty
Cyber Security
Analyst
Booz Allen Hamilton
USA
12
COMPUTER HACKING FORENSIC INVESTIGATOR V11
Organizations That Employ
C|HFI Certified Members
Sources:
1. https://www.ic3.gov/Media/PDF/AnnualReport/2022_IC3Report.pdf
2. https://www.ic3.gov/Media/PDF/AnnualReport/2022_IC3Report.pdf
3. https://www.ibm.com/reports/data-breach
13
About EC-Council
EC-Council invented the Certified Ethical Hacker (C|EH) Program. Founded in 2001 in response
to 9/11, the EC-Council's mission is to provide the training and certifications that apprentice and
experienced cybersecurity professionals need to keep corporations, government agencies, and
others who employ them safe from cyber-attacks.
Best known for its Certified Ethical Hacker program, EC-Council today offers 200 different
training programs, certifications, and degrees in everything from Computer Forensic
Investigation and Security Analysis to Threat Intelligence and Information Security. An ISO/IEC
17024 Accredited organization recognized under the US Defense Department Directive
8140/8570 and many other authoritative cybersecurity bodies worldwide, the company has
certified over 350,000 professionals across the globe. EC-Council is the gold standard in
cybersecurity education and certification, trusted by seven of the Fortune 10, half of the Fortune
100, and various agencies, public and private, across 140 nations.
A truly global organization with a driving belief in bringing diversity, equity, and inclusion to the
modern cybersecurity workforce, EC-Council maintains 11 offices in the US, the UK, India,
Malaysia, Singapore, and Indonesia.
For more details, visit: www.eccouncil.org