EC-Council Computer Hacking Forensic Investigator (CHFI)

EC-Council CHFI Training Philippines

Download PDF
EC-Council Computer Hacking Forensic Investigator (CHFI)




5 days


Courses Benefits

This CHFI training course will give you the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques.If you or your organization requires the knowledge or skills to identify, track, and prosecute the cyber-criminal, then this is the course for you.

The CHFI 312-49 exam will be conducted on the last day of training. Students need to pass the online Prometric exam to receive the CHFI certification.

EC-Council is the owner and creator of the world famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI) and EC-Council Certified Security Analyst (ECSA)/License Penetration Tester (LPT) programs, and as well as many others programs, that are offered in over 60 countries through a training network of more than 450 training partners globally.

ActiveLearning is an Authorized Training Partner of EC-Council in the Philippines.


You Will Learn How To

  • Understand how perimeter defenses work
  • Scan and attack you own networks, without actually harming them
  • Understand steps taken by intruders to escalate their privileges in your system
  • Detect intrustion, create policies, social engineering, DDoS attacks, buffer overflows, and even virus creation

Who Should Attend

Police and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies, IT managers. It is strongly recommended that you attend the CHFI class before enrolling into CHFI program.

Course Investment

Course Outline

Computer Forensics in Today's World

  • Forensics Science
  • Computer Forensics
  • Forensics Readiness
  • Cyber Crime
  • Cyber Crime Investigation
  • Corporate Investigations
  • Reporting a Cyber Crime

Computer Forensics Investigation Process

  • Investigating Computer Crime
  • Steps to Prepare for a Computer Forensics Investigation
  • Computer Forensics Investigation Methodology

Searching and Seizing Computers

  • Searching and Seizing Computers without a Warrant
  • Searching and Seizing Computers with a Warrant
  • The Electronic Communications Privacy Act
  • Electronic Surveillance in Communications Networks
  • Evidence

Digital Evidence

  • Digital Data
  • Types of Digital Data
  • Rules of Evidence
  • Electronic Devices: Types and Collecting Potential Evidence
  • Digital Evidence Examination Process
  • Electronic Crime and Digital Evidence Consideration by Crime Category

First Responder Procedures

  • Electronic Evidence
  • First Responder
  • Roles of First Responder
  • Spring's Data Access Object Support
  • Exception Handling

Transaction Management

  • Transactions
  • Transaction Management with JDBC
  • Spring Annotation-based Transaction Management
  • Specifying Propagation Behavior
  • Specifying Rollback Behavior
  • Spring XML-Based Transaction Management

Spring MVC

  • Using Spring in Ordinary Web Applications
  • The MVC Design Pattern
  • DispatcherServlet
  • Controllers
  • View Resolvers
  • Quickstart to Spring MVC


Sept 3 - 7, 2018 (9:00am - 5:00pm)

Request More Info