CHFI - Computer Hacking Forensic Investigator | Computer Forensics TrainingVendor: EC-Council
Category: Cyber Security
Computer forensics involves applying concepts and practices of computer investigation and analysis to determine potential on-line criminal activity and develop legal evidence. TrainACE’s Computer Hacking Forensic Investigator version 8 (CHFI) is an industry leading, internationally awarded computer forensics training course that will apply hands-on lab work to help students comprehend the processes of detecting hacker attacks and to gather the evidence required to be able to report the on-line crime and potentially take the criminal down for their attack. The CHFI certification class also conducts activities to help secure a network and prevent against network intrusion.
CHFI v8 Training in Maryland, Washington D.C. or Northern Virginia
Delivery Style: 75% Hands-On, 25% Lecture
CHFI Training Course Cost: $2,995 Per Enrollment (Exam Included)
Need a hotel for the week of your class? For a discounted hotel rate, please contact us. TrainACE has pre-negotiated a discounted stay for CHFI students in the Greenbelt Hilton Garden Inn. The Hotel is located approximately 200 yards from our school.
Self-Paced Online Training
Some individuals have extremely busy schedules and cannot afford to take time off to come to a classroom based hands-on training class. For a more flexible option, give one of our CHFI online training options a shot. All of the online courseware follows authorized curriculum.
CHFI Self-Paced Online Training
This self-paced, online training is authorized by EC-Council which means that it follows approved curriculum which is guaranteed to successfully prepare you for the CHFI exam as well as actual investigative environments!
Our CHFI Self-Paced training includes the following features:
- Interactive & explanatory instruction & lectures
- User-friendly interface with comprehensive course curriculum
- Step-by-step instructional videos
- Live, virtual lab environment(s)
- Toll-Free Educational Support
- Money-Back Guarantee
Custom Training For Your Organization
Does your organization have special training needs? Let us know! We'll put together a customized training course proposal targeted to the specific needs of your staff. Select your ideal start-date, your location preference and your equipment requests and we will gladly compose a training plan for your company quickly and free of any obligation.
All Times Listed in Eastern Standard Time (EST)
For information related to scheduling, please fill out the information request form to the right.
Topics & Concepts Covered in CHFI Version 8 Training Include:
- Establish and maintain a physical “chain of custody”
- Create and verify forensically sterile examination media
- Create forensic boot diskettes
- Find and recover deleted, formatted, hidden, and lost data
- Access e-mail, cache, and other internet related files
- Unlock passwords
Recommended CHFI v8 Audience and Prerequisites
The Certified CHFI training course will benefit Police and other law enforcement personnel, Department of Defense and Military personnel, e-Business Security professionals, Systems administrators, Network admins, Legal professionals, Banking, Insurance professionals, Government agencies, IT managers and more.
Attendees of computer hacking forensic investigator training should be familiar with Windows-based computers. Attendees can be anyone involved in the security of information assets: information security officers and managers, IT administrators, consultants, systems and data security analysts, even lawyers and HR managers.
CHFI Certification Requirements
This course helps you prepare for EC-Council’s CHFI v8 certification exam. The examination consists of 150 questions and the passing score is 70%.
**Federal, State, Local and Government Employees can have your organization purchase this class with our GSA Contract #GS-35F-0431S.
News related to CHFI
- Recently Updated – Certified Ethical Hacker Exam Study Guide (4/24/2015)
- What is Big Data and Why is It So Important? (9/24/2014)
- The Importance of Mobile Security (9/16/2014)