Lifetime
An ITU Online Training exclusive. The only Buy Once, Never Pay for IT training again program available. Plus, get all new and updated content for life.
With an All-Access Pass, you get access to every current and future ITU course. Access over 2,500 hours of on-demand IT Training 24/7. With over 13,000 on-demand training videos and 19,000+ practice questions, you'll have the tools to excel in the critical IT skills needed to elevate your IT Career. Our All-Access pass is available in three affordable plans.
Paris is the capital of France.
Tokyo is the capital of Japan.
Most Popular
Categories
With an All-Access Pass, you get access to every current and future ITU course. Access over 2,500 hours of on-demand IT Training 24/7. With over 13,000 on-demand training videos and 19,000+ practice questions, you'll have the tools to excel in the critical IT skills needed to elevate your IT Career. Our All-Access pass is available in three affordable plans.
ITU provides a vast array of IT-focused on-demand training designed to help you excel in both entry-level and advanced IT skills. Browse our most popular training or take a deper dive into our robust catalog of training categories.
Popular Courses All CategoriesCompTIA Train for a globally recognized IT certification with our comprehensive CompTIA courses. A+ | Network+ | Security+ Cybersecurity Master the art of combating cybersecurity threats and become a cyber hero. Ethical Hacking (CEH) | CISSP | CISM Cloud Computing An essential skill set in today's IT environments. Learn cloud computing platforms Azure Administrator | Google Cloud | AWS Practitioner Project Management Key to successful projects, learn the skills and methodolgy behind project management. PMP | Risk Mgmt | Agile PM Adobe Business & Management Cisco Cloud Computing CompTIA Computer Support Cybersecurity Data Administration Data Analysis Development & Programming Marketing & Social Media Medical Coding & Billing Microsoft Microsoft Office Network Administration Networking & Software Project Management Web Development
This CHFI course will cover the security discipline of computer forensics from a vendor-neutral perspective and work towards preparing students to become Forensic Investigators in Computer Hacking.
Included In This Course
Closed Captions
Certificate of Completion
Course Description
Our CHFI Course – Computer Hacking Forensics Investigator (ECC 312-49) course will help you to gain knowledge in the specific security discipline of computer forensics from a vendor-neutral perspective and work towards becoming a Forensic Investigator in Computer Hacking. This course will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.
The “Ethical Hacking” and “Forensic Investigator in Computer Hacking” course(s) are unofficial programs that have been developed by ITU independently of EC-Council. EC-Council has not been endorsed, sponsored or certified this material at any time whatsoever. Usage of these material/books does not provide any guarantee of passing the EC-Council exam. The ITU Online course on Computer Hacking Forensics Investigator (ECC 312-49) is a comprehensive program designed to teach the key aspects of computer forensics. It covers topics such as the forensics investigation process, digital evidence, first responder procedures, network forensics, various tools and techniques used in forensic analysis, and preparing for the CHFI ECC 312-49 exam. This course is suitable for IT professionals, law enforcement personnel, legal professionals, and anyone interested in cybersecurity and forensic investigation.
Do you have what it takes to be a Computer Hacking Forensic Investigator? CHFI is a DoD 8570 / 8140 approved certification for cybersecurity professionals, and the process involves detecting hacking attacks and extracting evidence to report crimes. It’s also used in audits to prevent future attacks from occurring. Governments, police departments, and corporations around the world are using this computer investigation technique with EC-Council’s CHFI certification as proof of these skills.
With the comprehensive CHFI training you’ll receive through ITU, you will be better equipped to identify and apprehend cybercrime culprits. You’ll develop effective strategies for searching and seizing, as well as chain-of-custody acquisition, preservation, analysis and reporting of digital evidence that meet legal standards. By taking this vendor-neutral training course your knowledge base will be sufficiently primed so that when it comes time for sitting for the official CHFI certification exam – you are ready!
By obtaining the CHFI – Computer Hacking Forensic Investigator certification, you can demonstrate your capability to detect cyber breaches, properly extract and save digital evidence from computers and storage devices, as well as understand how hackers execute their attacks.
Designed specifically for IT Managers, Law enforcement officers, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal representatives & employees of Banking and Insurance as well as other professional industries – this expert-level cybersecurity certification is a must have.
Understanding the key terms in the field of Computer Hacking Forensic Investigation is crucial for anyone interested in pursuing a career in cybersecurity, digital forensics, or a related field. This knowledge is not only essential for grasping the concepts taught in courses like the CHFI but also for practical application in real-world scenarios. The terms listed below encompass various aspects of digital forensics, including investigation processes, tools, and legal considerations, providing a comprehensive vocabulary for aspiring forensic investigators.
Term | Definition |
---|---|
Computer Forensics | The practice of collecting, analyzing, and reporting on digital data in a way that is legally admissible. |
Forensic Investigation Process | A systematic approach used in forensics for collecting, preserving, and analyzing digital evidence. |
Searching and Seizing | Legal and technical procedures involved in searching for and seizing digital evidence. |
Digital Evidence | Information stored or transmitted in binary form that may be relied on in court. |
First Responder Procedures | Guidelines for the initial handling of digital evidence to preserve its integrity. |
Forensics Lab | A controlled environment where digital forensic analysis is performed. |
Hard Disks and File Systems | Storage media and the structures they use to store data, crucial in forensic analysis. |
Windows Forensics | Techniques specific to investigating Windows operating systems. |
Data Acquisition and Duplication | Methods of capturing and copying digital evidence without altering it. |
Recovering Deleted Files and Partitions | Techniques for retrieving data that has been deleted or lost from storage media. |
AccessData FTK | A digital forensics software used for scanning a hard drive looking for various information. |
EnCase | A suite of digital investigations products by Guidance Software that provides data acquisition and analysis. |
Steganography | The practice of hiding messages or information within other non-secret text or data. |
Password Crackers | Tools used to recover or guess passwords from data that have been stored or transmitted. |
Log Correlation | The process of analyzing and correlating logs from various sources for forensic purposes. |
Network Forensics | The capture, recording, and analysis of network events to discover the source of security attacks. |
Wireless Attacks | Methods of compromising wireless networks, relevant in both attack and defense contexts. |
Web Attacks | Various forms of cyberattacks targeted at web resources or carried out through web technologies. |
Email Crimes | Illegal activities involving email communication, including phishing, spamming, and email fraud. |
Mobile Investigation | Forensic techniques specifically focused on mobile devices, such as phones and tablets. |
Investigative Reports | Documents that detail the findings of a forensic investigation. |
Expert Witness | A person with specialized knowledge or expertise who testifies in court about forensic evidence. |
CHFI Certification | A certification for individuals who demonstrate the ability to perform comprehensive computer forensic analysis. |
ECC 312-49 Exam | The examination for the Computer Hacking Forensic Investigator certification. |
Pearson VUE | A company that administers certification exams for various industries, including IT and cybersecurity. |
Vendor-Neutral | A characteristic of a course or certification that is not focused on any specific vendor’s products or services. |
Cybersecurity | The practice of protecting systems, networks, and programs from digital attacks. |
Chain of Custody | A process that tracks the movement and handling of evidence from the time it is obtained. |
Legal Standards | The requirements set by law for the admissibility of evidence in court. |
DoD 8570 / 8140 | A U.S. Department of Defense directive that lists the required certifications for certain IT positions. |
This list provides a foundational understanding of the terms and concepts that are pivotal in the field of computer hacking forensics investigation.
ECC 312-49 refers to the exam code for the Certified Ethical Hacker (CEH) certification, which is offered by the EC-Council. This certification is designed for professionals in the field of information security, particularly those involved in ethical hacking. It validates their skills in identifying vulnerabilities and weaknesses in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner.
To be eligible for the CEH exam, candidates usually need a strong background in information security. While there are no strict educational requirements, it is recommended that candidates have at least two years of work experience in the Information Security domain. Alternatively, candidates can take an official EC-Council training program, which waives the work experience requirement.
The CEH exam covers a broad range of topics related to ethical hacking and cybersecurity. These include network scanning, system hacking, malware threats, sniffing, social engineering, denial-of-service attacks, session hijacking, hacking web applications, SQL injection, cryptography, penetration testing, and various other security-related concepts.
The CEH exam typically consists of multiple-choice questions that test the candidate’s knowledge and understanding of ethical hacking techniques and tools. The number of questions and the duration of the exam can vary, so it’s important to check the latest exam blueprint from the EC-Council for the most current information.
Preparation for the CEH exam can involve a mix of self-study, enrolling in training programs offered by the EC-Council, and practical experience. Many candidates use study guides, online resources, and practice exams to prepare. Hands-on experience with ethical hacking tools and techniques is also highly beneficial. Joining forums and study groups can also provide additional insights and study materials.
Course Outline
Dean has had fun for the past 20 years learning and teaching everything he can in technology and security. His consulting experience in accounting systems, inventory control, migrations, and patch management has breathed life into his 12 years in the class room. Dean is a courseware developer who specializes in CISSP and security training. He is the lead instructor for Expanding Security and teaches online as his main job. As a non-military person, he is a proud recipient of six mission coins.
Start this course for free with our 10-day trial of the all-access subscription providing access to over 2,600 hours of training.
$49.00
Monthly All-Access Subscription
7 Days Free - $39.00 / month
A great option at an affordable monthly price.
Annual All-Access Subscription
$229 / year
A discounted price when paying for your All Access library on an annual basis.
Lifetime All-Access Library
$379 One time payment
Exceptional Value. Pay once, never have to buy IT training again.
$49.00
Master cybersecurity with our Security+ 701 Online Training Course, designed to equip you with essential skills for protecting against digital threats. Ideal for aspiring security specialists, network administrators, and IT auditors, this course is a stepping stone to mastering essential cybersecurity principles and practices.
$49.00
This Certificate of Cloud Security Knowledge (CCSK) Certification Training course is perfect for students who want to gain a comprehensive understanding of cloud security. The Cloud Security Alliance CCSK certification exam will be covered in depth, as well as important topics such as Governance and Risk Management, the Cloud Architectural Framework, and Business Continuity/Disaster Recovery.
$49.00
The CompTIA CASP + exam ascertains the knowledge and abilities essential for designing, engineering, and conceptualizing secure solutions in complex corporate scenarios for Advanced Security Practitioner. This IT course necessitates utilizing critical thinking across a vast array of security disciplines to develop and put into practice solutions that fulfill enterprise needs while also managing risk.
Unlock endless learning opportunities with over 2,500 hours of IT training at our lowest price ever. Plus, get all new and updated online courses for free while your subscription remains active.
Cancel at your convenience. This exceptional deal on IT training provides you access to high-quality IT education at the lowest monthly subscription rate in the market. Boost your IT skills and join our journey towards a smarter tomorrow.
Mary Beth helped me. She was wonderful.