(Click Category to List Courses)

41 - IT-S Information Technology - Security and Audit

IT-S 128 - Computer Hacking Forensics Investigator (CHFI) V9.0

Code Start Date Duration Venue
IT-S 128 20 March 2023 5 Days Istanbul Registration Form Link
IT-S 128 15 May 2023 5 Days Istanbul Registration Form Link
IT-S 128 10 July 2023 5 Days Istanbul Registration Form Link
IT-S 128 04 September 2023 5 Days Istanbul Registration Form Link
IT-S 128 30 October 2023 5 Days Istanbul Registration Form Link
IT-S 128 25 December 2023 5 Days Istanbul Registration Form Link
Please contact us for fees


Course Description

Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.

Computer crime in today’s cyber world is on the rise. Computer Investigation techniques are being used by police, government and corporate entities globally. Computer Security and Computer Investigations are changing terms. More tools are invented daily for conducting Computer Investigations. Be it computer crime, digital forensics, computer investigations, or even standard computer data recovery, the tools and techniques covered in this program will prepare the participants to conduct computer investigations using groundbreaking digital forensics technologies.

Course Objectives

  • Understanding computer forensics investigation process
  • Setting up workstation for computer forensics
  • Investigating various types of attacks
  • Learning how to recover deleted files 
  • Becoming a witness in cyber crimes 

Who Should Attend?

  • Police and other laws enforcement personnel
  • Defense and military personnel
  • E-Business security professionals
  • Systems administrators
  • Legal professionals

Course Details/Schedule

Day 1

  • Computer forensics and investigations as a profession
  • Understanding computer investigations
  • Working with windows and dos systems
  • Macintosh and Linux boot processes and disk structures
  • The investigators office and laboratory

Day 2

  • Current computer forensics tools
  • Digital evidence controls
  • Processing crime and incident scenes
  • Data acquisition
  • Computer forensic analysis
  • E-mail investigations
  • Recovering image files

Day 3

  • Writing investigation reports
  • Becoming an expert witness
  • Computer security incident response team
  • Logfile analysis
  • Recovering deleted files
  • Application password crackers

Day 4

  • Investigating e-mail crimes
  • Investigating web attacks
  • Investigating network traffic
  • Investigating router attacks

Day 5

  • The computer forensics process
  • Data duplication
  • Windows forensics
  • Linux forensics
  • Enforcement law and prosecution
  • Investigating trademark and copyright infringement