Certified Hacking Forensic Investigator



Certified Hacking Forensic Investigator (CHFI)

The Certified Hacking Forensic Investigator (CHFI) by Sytech Labs is the most comprehensive course have the skills and knowledge to uncover and analyze complex digital evidence, which is then used to hunt down and prosecute today’s most sophisticated cyber criminals. Most importantly they do it in a forensically sound manner, thus ensuring that the investigation and its findings are legally admissible. The CHFI curriculum is vendor-neutral, so certification holders can apply their trade across a wide range of computing environments, regardless of the particular technologies in question.

  • Introduction to Ethical Hacking
  • Fundamentals of Cyber Security
  • Basics of networking and its concepts
  • Information Gathering(Foot printing and Reconnaissance)
  • Computer Hacking and Its Security
  • Email Analysis
  • IP Grabbing & Its Investigation procedures
  • Scanning - finding target in network
  • IP Spoofing & MAC Spoofing
  • Proxy Server & VPN Technologies
  • DeepFakes
  • Virus worms & Trojan and their Functionalities
  • Sniffers
  • Phishing Attacks
  • Passwords cracking basic and security
  • DDoS attacks
  • Botnet & Malware
  • Social Engineering, shoulder surfing, Dumpster Driving
  • Introduction to Cryptography & Staganography
  • Website Hacking
  • Malware Analysis
  • Mobile Hacking and Its security
  • Buffer overflow
  • Firewall, IDS & IPS and their log analysis
  • Registry Hacking
  • Introduction Vulnerability Assessment and Penetration Testing
  • Introduction to Kali Linux
  • Hands on various tools in Kali Linux
  • SQL Mapping
  • Metasploit
  • Introduction to Computer Forensic & Cyber Crime and Law
  • Computer Forensics
  • Why and When Do You Use Computer Forensics?
  • Understanding architecture of operating systems
  • Electronic Evidence
  • First Responder
  • Roles of First Responder
  • Electronic Devices: Types and Collecting Potential Evidence
  • MD5 Calculation
  • Writing the Investigation Report
  • Post-Seizure Issues
  • Key Steps in Forensics Investigation
  • Rules of Forensics Investigation
  • Need for Forensics Investigator
  • Collect the Evidence
  • Data Recovery Software
  • Accessing Computer Forensics Resources
  • Understanding Corporate Investigation
  • Who to Contact at the Law Enforcement?
  • Building the Investigation Team
  • Risk Assessment
  • Evaluate and Secure the Scene
  • Forensics Photography
  • Gather the Preliminary Information at the Scene
  • Collect Physical Evidence
  • Evidence Collection Form
  • Collect Electronic Evidence
  • Guidelines for Acquiring Evidence
  • Various Forensic Tools
  • Submitting reports to FSL
  • Final Verification and Preparing charge sheet

Duration

  • Course Duration: 2 Months

Who should attend ?

  • All students who use computers and Internet for their personal or academic work
  • College students for Industrial training.
  • Students from any stream can attend this training.
  • Students who want to make their career in Information Security and Ethical Hacking.
  • Staff and Employees of colleges/school can join this training to live more secure from various attacks.


Things required for Online Training

  • Laptop or Desktop (Os: Win7 / Win8 / Mac)
  • Internet Connection (Speed: min. 25mbps)
  • Headphones with mic

Key Take
Away

  • The premier Certification in Ethical Hacking & Information Security
  • Hacking and Security Tools, Books, Tutorials to each student
  • Training by White Hat Hackers, Ethical Hackers, and Information Security Experts
  • Covers both sides of the coin - Attacks and Counter measures
  • Live training on pre attacks with their Counter measures, Hands on use many technical tools