Cyber Forensics Investigator (SF) Synchronous e-Learning - ITEL

Cyber Forensics Investigator (SF) Synchronous e-Learning

Cybersecurity

Clientele

Cyber Forensics Investigator (SF) Synchronous e-Learning

Course Overview

The Certified Hacking Forensic Investigator (C|HFI) credential from EC-Council is the most trusted digital forensics certification valued by employers worldwide. The comprehensive curriculum aligns with all crucial global digital forensic job roles. It covers a detailed and methodological approach to digital forensics and evidence analysis, including areas such as Dark Web, IoT, and Cloud Forensics. Upon achieving the C|HFI certification, you will be empowered with the skills and expertise needed to conduct digital investigations using groundbreaking technologies.

WHAT’S NEW IN CHFI V9?
  • Updated information as per the latest developments with a proper flow.
  • New investigation techniques and updated forensic investigation tools.
  • Classroom-friendly with a graphical representation of concepts and attacks.
  • Exclusive section for best practices to follow during a forensic investigation.
  • Exclusive section for disk acquisition tools requirements to carry out the successful investigation.
  • New and rich presentation style with engaging graphics.
  • Latest OS covered and a patched testing environment.
  • Well tested, result-oriented, descriptive, and analytical lab manual to evaluate the presented concepts.
  • Sample evidence files (~6GB) are provided that assist participant to carry out an analysis.
  • CHFIv9 is accompanied by iLabs.
  • Forensic challenges based real-time scenarios are provided in the Lab manual to practice.
WHY CHFI?
  • The program is developed after a thorough job tasks analysis and market research.
  • It is designed and developed by experienced SMEs and digital forensic practitioners.
  • CHFI is a vendor neutral course covering all major forensics investigations technologies and solutions.
  • Detailed labs for hands-on learning experience; approximately 40% of training time is dedicated to labs.
  • It covers all the relevant knowledge-bases and skills to meet with regulatory compliance standards such as ISO 27001, PCI DSS, SOX, HIPPA, etc.
  • More than 40 GB of digital forensics and evidence analysis tools.
  • Student kit which contains large number of white papers for additional reading.
  • The program presents a repeatable forensics investigation methodology required from a versatile digital forensic professional which increases your employability.
  • The student kit contains a large number of forensics investigation templates for evidence collection, chain-of-custody, final investigation reports, etc.
  • The program comes with cloud-based virtual labs enabling participants to practice various investigation techniques in a real-time and simulated environment.

Learning Outcomes

Upon the completion of the course, the learner would be able to:

  1. Understand current computer forensics, and legal principles in relation to forensic investigations.
  2. Understand Computer Hacking Investigation Process.
  3. Understand Hard Disks and Files Systems.
  4. Understand data acquisition and duplication process.
  5. Understand challenges faced by investigators to defeat anti-forensics.
  6. Understand how to collect and examine volatile and non-volatile data in various Operating Systems.
  7. Understand Network Forensics.
  8. Investigate various attacks on web applications.
  9. Understand database forensics.
  10. Understand and implement cloud forensics.
  11. Perform malware forensics.
  12. Investigate email crimes.
  13. Perform mobile forensics.
  14. Create digital forensics report.

Who Should Attend?

The CHFI program will significantly benefit to the following professionals who involved with information system security, computer forensics, and incident response:
  • Computer Forensic Analyst
  • Computer Network Defense (CND) Forensic Analyst
  • Digital Forensic Examiner
  • Forensic Analyst
  • Forensic Analyst (Cryptologic)
  • Forensic Technician
  • Network Forensic Examiner
  • Computer Crime Investigator
  • Special Agent

Course Prerequisite

Education:

  • Minimum GCE O Levels.
  • English Speaking at ESS level 5.

 

Technical Skills and Knowledge:

  • Some exposure and experience with Penetration Testing Methods, Tools, and Techniques.
  • Understanding of Ethical Hacking Process.
  • Some exposure and experience with Vulnerability Assessment, and Exploits.
  • The ability in analysing Risk Management and Penetration Testing Process.
  • Some exposure and in generating Vulnerability Reports.

 

Working Experience:

  • Recommended to have at least 2 years working experience in Information Security domain.

Course Outline

Lesson 1: Computer Forensics in Today’s World
  • Fundamentals of Computer Forensics
  • Cybercrimes and Their Investigation Procedures
  • Digital Evidence and eDiscovery
  • Forensic Readiness
  • Roles of Various Processes and Technologies in Computer Forensics
  • Roles and Responsibilities of a Forensic Investigator
  • Challenges Faced in Investigating Cybercrimes
  • Standards and Best Practices in Computer Forensics
  • Laws and Legal Compliance in Computer Forensics

Lesson 2: Computer Forensics Investigation Process
  • Forensic Investigation Process and Its Importance
  • First Response
  • Pre-Investigation Phase
  • Investigation Phase
  • Post-Investigation Phase

Labs:

  • Create a hard disk image file for forensic investigation and recover the data

Lesson 3: Understanding Hard Disks and File Systems
  • Disk Drives and Their Characteristics
  • Logical Structure of a Disk
  • Booting Process of Windows, Linux, and macOS Operating Systems
  • File Systems of Windows, Linux, and macOS Operating Systems
  • File System Analysis
  • Storage Systems
  • Encoding Standards and Hex Editors
  • Analyzing Popular File Formats

Labs:

  • Analyze the file systems of Linux and Windows evidence images and recover deleted files
  • Analyze file formats

Lesson 4: Data Acquisition and Duplication
  • Data Acquisition
  • eDiscovery
  • Data Acquisition Methodology
  • Preparing an Image File for Examination

Labs:

  • Create a forensic image for examination and convert it into various supported formats for data acquisition.

Lesson 5: Defeating Anti-Forensic Techniques
  • Anti-Forensics Techniques
  • Data Deletion and Recycle Bin Forensics
  • File Carving Techniques and Methods for Recovering Evidence from Deleted Partitions
  • Password Cracking/Bypassing Techniques
  • Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension
  • Mismatches
  • Techniques for Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption
  • Program Packers and Footprint Minimization Techniques

Labs:

  • Perform solid-state drive (SSD) file carving on.
  • Windows and Linux file systems.
  • Recover lost or deleted partitions and their contents.
  • Crack passwords of various applications.
  • Detect hidden data streams and unpack program packers.

Lesson 6: Operating Systems Forensics
  • Windows Forensics
  • Collect Volatile Information
  • Collect Non-Volatile Information
  • Windows Memory Analysis
  • Windows Registry Analysis
  • Electron Application Analysis
  • Web Browser Forensics
  • Examine Windows Files and Metadata
  • ShellBags, LNK Files, and Jump Lists
  • Text-Based Logs and Windows Event Logs

Labs:

  • Acquire and investigate RAM and Windows registry contents.
  • Examine forensic artifacts from web browsers.
  • Identify and extract forensic evidence from computers.

Lesson 7: Network Forensics
  • Collect Volatile Information in Linux
  • Collect Non-Volatile Information in Linux
  • Linux Memory Forensics
  • Mac Forensics
  • Collect Volatile Information in Mac
  • Collect Non-Volatile Information in Mac
  • Mac Memory Forensics and Mac Forensics Tools

Labs:

  • Perform volatile and non-volatile data acquisition on Linux and Mac computers.
  • Perform memory forensics on a Linux machine.

Lesson 8: Investigating Web Attacks
  • Network Forensics
  • Event Correlation
  • Indicators of Compromise (IoCs) from Network Logs
  • Investigate Network Traffic
  • Incident Detection and Examination
  • Wireless Network Forensics
  • Detect and Investigate Wireless Network Attacks

Labs:

  • Identify and investigate network attacks.
  • Analyze network traffic for artifacts.

Lesson 9: Database Forensics
  • Malware
  • Malware Forensics
  • Static Malware Analysis
  • Analyze Suspicious Documents
  • System Behavior Analysis
  • Network Behavior Analysis
  • Ransomware Analysis

Labs:

  • Perform static malware analysis.
  • Analyze a suspicious PDF file and Microsoft Office document.
  • Emotet malware analysis

Lesson 10: Cloud Forensics
  • Web Application Forensics
  • Internet Information Services (IIS) Logs
  • Apache Web Server Logs
  • Detect and Investigate Various Attacks on Web Applications

Labs:

  • Identify and investigate web application attacks

Lesson 11: Malware Forensics
  • Dark Web and Dark Web Forensics
  • Identify the Traces of Tor Browser during Investigation
  • Tor Browser Forensics

Labs:

  • Detect To Browser Activity and examine RAM dumps to discover Tor Browser artifacts

Lesson 12: Investigating Email Crimes
  • Cloud Computing
  • Cloud Forensics
  • Amazon Web Services (AWS) Fundamentals
  • AWS Forensics
  • Microsoft Azure Fundamentals
  • Microsoft Azure Forensics
  • Google Cloud Fundamentals
  • Google Cloud Forensics

Labs:

  • Forensic acquisition and examination of an Amazon EC2 Instance, Azure VM, and GCP VM

Lesson 13: Mobile Forensics
  • Email Basics
  • Email Crime Investigation and its Steps
  • U.S. Laws Against Email Crime
  • Social Media Forensics

Labs:

  • Investigate a suspicious email to extract forensic evidence

Lesson 14: Forensic Report Writing and Presentation
  • Mobile Device Forensics
  • Android and iOS Architecture and Boot Process
  • Mobile Forensics Process
  • Investigating Cellular Network Data
  • File System Acquisition
  • Phone Locks, Rooting, and Jailbreaking of Mobile Devices
  • Logical Acquisition of Mobile Devices
  • Physical Acquisition of Mobile Devices
  • Android and iOS Forensic Analysis

Labs:

  • Examine an Android image file and carve deleted files

Lesson 15: IoT Forensics
  • IoT Concepts
  • IoT Device Forensics

Course Fee (inclusive of 9% GST)

Individual
Criteria Price inclusive of GST

Full Course Fee

$2,997.50

Singapore Citizens (SCs) and Permanent Residents (PRs)
Funding Up to 50% of course fees

$1,622.50

SCs aged ≥ 40 years old ( SkillsFuture Mid-career Enhanced Subsidy )
Funding Up to 70% of course fees

$1,072.50

Criteria Price inclusive of GST

Full Course Fee

$2,997.50

Singapore Citizens (SCs) and Permanent Residents (PRs)
Funding Up to 50% of course fees

$1,622.50

SCs aged ≥ 40 years old ( SkillsFuture Mid-career Enhanced Subsidy )
Funding Up to 70% of course fees

$1,072.50

Criteria Price inclusive of GST

Full Course Fee

$2,997.50

Singapore Citizens (SCs) and Permanent Residents (PRs)
Funding Up to 50% of course fees

$1,072.50

SCs aged ≥ 40 years old ( SkillsFuture Mid-career Enhanced Subsidy )
Funding Up to 70% of course fees

$1,072.50

SkilsFuture Credit

SSG-funded courses are eligible for SkillsFuture Credit. Singaporeans over the age of 25 can use their Skillsfuture credit to register in courses.

Post-Secondary Education Account (PSEA)

All Singaporeans aged under 31 are eligible to use their PSEA account for the following course.

Course Dates

Course Dates Mode of Delivery Duration
Online Live Learning (OLL)
5 Days
Online Live Learning (OLL)
5 Days
Online Live Learning (OLL)
5 Days
Online Live Learning (OLL)
5 Days

SSG Funding Requirements

All Trainees must take note of the following:

  1. Must attend at least 75% of the course before being eligible to take the assessments.
  2. Dynamic QR Code Attendance Taking:
    a. Scan the QR Code that will be displayed by the Trainer on each session. Use your SingPass App to scan and submit your attendance. If you fail to do so, you will be deemed absent from that session.
    b. The QR Code is only accessible on:
    – Morning Session: between 9.00 am to 1.00 pm.
    – Afternoon Session: between 2.00 pm to 6.00 pm.
    Please take the attendance one at a time as the system can only register you one by one.
  3. Sign daily on the Attendance Sheet as a backup if any technical glitch happens.
  4. Submit Course Evaluation by the end of each module to help us improve the course and your future learning experience with us.

Certification

Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a Certificate of Completion by ITEL

Course Code: TGS-2020000370
Course Support Period: 10 Nov 2020 – 9 Nov 2026

Note: All certificate images are for illustrative purposes only and may be subject to change at the discretion of ITEL.

e-Statement of Attainment (SOA) from SkillsFuture Singapore (SSG)

Upon meeting attendance requirements and passing the assessment(s), participants will receive an e-Statement of Attainment (SOA) from SkillsFuture Singapore (SSG).

External Certification Exam

The participant will be able to attempt the CHFI exam after attending this course. Upon passing the exam, the participant will receive CHFI accreditation from EC-Council.

FAQs

What does the Cyber Forensic Investigator (SF) consist of?

Yes. EC-Council’s CHFI is a comprehensive certification program with 68 complex labs. It has extensive coverage of digital forensics that offers candidates a practical and holistic approach to cyber threats.

To become a Computer Hacking Forensics Investigator, one must complete the 4-hour CHFI exam.

You can become a CHFI expert by completing the CHFI exam and earning a credential. Once certified, you can prove your competency in digital forensics, from analyzing digital evidence to prosecuting cybercriminals.

After becoming a CHFI professional, you can become a digital forensics investigator, incident response analyst, computer forensics examiner, cybersecurity consultant, digital forensics manager, and more.

This course is designed for IT/forensics professionals, is open to individuals with a basic understanding of IT/cybersecurity, computer forensics, and incident response.

A Computer Hacking Forensic Investigator (CHFI) is a professional who interprets digital evidence in the context of computer-related crimes. Their primary responsibilities include conducting in-depth digital forensics investigations and obtaining and archiving electronic evidence from various sources, including computers, networks, and digital devices. Additionally, a CHFI is essential in processing evidence, drafting reports, and offering cybersecurity advice.

Digital forensics utilizes methodical techniques to retrieve lost data, ensure legal compliance, and attribute attacks, preventing future incidents and enhancing overall cybersecurity defenses. This ability is crucial for any organization to be prepared not only in the event of any cyber attack but also in using these investigational skills.

Learner's Testimonials

Early registrations are encouraged.  

Cyber Forensics Investigator (SF) Synchronous e-Learning
Online Live Learning (OLL)
5 Days

From S$ 1,072.50 (After Eligible SSG Subsidies) 

Download Cyber Forensics Investigator (SF) [OLL] Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Windows Server 2019 Administration (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cloud Technology Solutions Architect Associate (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Security Analysis and Penetration Testing (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Information Systems Security (SF) [OLL] Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Microsoft Certified: Azure Fundamentals (AZ-900) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Microsoft Certified Azure Network Engineer Associate (AZ-700) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cyber Threat Intelligence Analyst (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cyber Security Incident Handling and Response (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Certified Ethical Hacker (CEH) (SF) [OLL] Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Certified Ethical Hacker (CEH) (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download (SCTP) Advanced Certificate in Cyber Security Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download (SCTP) Higher Certificate in Network Administration Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Strategic Cyber Security Leadership (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cisco Certified Network Associate (CCNA) (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Course Listing Download Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Cisco Certified Network Associate Download Course Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List
Course Enquiry for Cyber Forensics Investigator (SF) Synchronous e-Learning

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
I want to find out more about:*
Where did you hear of ITEL?*
*Note: If you chose Others, kindly provide more information in the Remarks/Comments/Questions box.
Consent*
Newsletter Subscription