courseComputer Hacking Forensic Investigator (CHFI)

Train to become a Computer Hacking Forensic Investigator (CHFI)!

CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.

Buy Now

What's Included

Wiki_tick  Unlimited access for 12 months

Wiki_tick  Access anywhere, any time

Wiki_tick  Fast effective training, written and designed by industry experts

Wiki_tick  Unlimited support

Wiki_tick  Save money, time and travel costs

Wiki_tick  Learn at your own pace and leisure

Wiki_tick  Easier to retain knowledge and revise topics than traditional methods

What the course will teach you:

  • Learn about computer forensics from a vendor-neutral perspective
  • Learn about the Forensics Investigation Process
  • As well as digital evidence and responder procedures
  • And much more...

Buy Now

Units Of Study

Computer Hacking Forensic Investigator (CHFI)

Course Duration: 18.5 Hours

Module 1: Computer Forensics Introduction

1.0 Intro to Course Pt. 1
1.1 Intro to Course Pt. 2
1.2 Intro to Course Pt. 3
1.3 Intro to Course Pt. 4
1.4 Intro to Course Pt. 5
1.5 Intro to Forensics Pt. 1
1.6 Intro to Forensics Pt. 2
1.7 Intro to Forensics Pt. 3
1.8 Intro to Forensics Pt. 4
1.9 Intro to Forensics Pt. 5
1.10 Intro to Forensics Pt. 6
1.11 Intro to Forensics Pt. 7
1.12 Intro to Forensics Pt. 8

Module 2: Forensics Investigation Process

2.0 Forensics Investigation Process Pt. 1
2.1 Forensics Investigation Process Pt. 2
2.2 Forensics Investigation Process Pt. 3
2.3 Forensics Investigation Process Pt. 4
2.4 Forensics Investigation Process Pt. 5
2.5 Forensics Investigation Process Pt. 6
2.6 Forensics Investigation Process Pt. 7
2.7 Forensics Investigation Process Pt. 8
2.8 Forensics Investigation Process Pt. 9
2.9 Forensics Investigation Process Pt. 10

Module 3: Searching and Seizing

3.0 Searching and Seizing Pt. 1
3.1 Searching and Seizing Pt. 2
3.2 Searching and Seizing Pt. 3
3.3 Searching and Seizing Pt. 4
3.4 Searching and Seizing Pt. 5

Module 4: Digital Evidence

4.0 Digital Evidence Pt. 1
4.1 Digital Evidence Pt. 2
4.2 Digital Evidence Pt. 3
4.3 Digital Evidence Pt. 4
4.4 Digital Evidence Pt. 5
4.5 Digital Evidence Pt. 6
4.6 Digital Evidence Pt. 7

Module 5: First Responder Procedures

5.0 First Responder Procedures Pt. 1
5.1 First Responder Procedures Pt. 2
5.2 First Responder Procedures Pt. 3
5.3 First Responder Procedures Pt. 4
5.4 First Responder Procedures Pt. 5
5.5 First Responder Procedures Pt. 6
5.6 First Responder Procedures Pt. 7
5.7 First Responder Procedures Pt. 8

Module 6: Forensics Lab

6.0 Forensic Lab Pt. 1
6.1 Forensic Lab Pt. 2
6.2 Forensic Lab Pt. 3
6.3 Forensic Lab Pt. 4
6.4 Forensic Lab Pt. 5

Module 7: Hard Disks and File Systems

7.0 Hard Disks and File Systems Pt. 1
7.1 Hard Disks and File Systems Pt. 2
7.2 Hard Disks and File Systems Pt. 3
7.3 Hard Disks and File Systems Pt. 4
7.4 Hard Disks and File Systems Pt. 5
7.5 Hard Disks and File Systems Pt. 6
7.6 Hard Disks and File Systems Pt. 7
7.7 Hard Disks and File Systems Pt. 8
7.8 Hard Disks and File Systems Pt. 9
7.9 Hard Disks and File Systems Pt. 10

Module 8: Windows Forensics

8.0 Windows Forensics Pt. 1
8.1 Windows Forensics Pt. 2
8.2 Windows Forensics Pt. 3
8.3 Windows Forensics Pt. 4
8.4 Windows Forensics Pt. 5
8.5 Windows Forensics Pt. 6
8.6 Windows Forensics Pt. 7
8.7 Windows Forensics Pt. 8
8.8 Windows Forensics Pt. 9
8.9 Windows Forensics Pt. 10

Module 9: Data Acquisition and Duplication

9.0 Data Acquisition and Duplication Pt. 1
9.1 Data Acquisition and Duplication Pt. 2
9.2 Data Acquisition and Duplication Pt. 3
9.3 Data Acquisition and Duplication Pt. 4
9.4 Data Acquisition and Duplication Pt. 5
9.5 Data Acquisition and Duplication Pt. 6
9.6 Data Acquisition and Duplication Pt. 7

Module 10: Recovering Deleted Files and Partitions

10.0 Recovering Deleted Files and Partitions Pt. 1
10.1 Recovering Deleted Files and Partitions Pt. 2

Module 11: Using Access Data FTK

11.0 Using Access Data FTK and Special Steps Pt. 1
11.1 Using Access Data FTK and Special Steps Pt. 2
11.2 Using Access Data FTK and Special Steps Pt. 3
11.3 Using Access Data FTK and Special Steps Pt. 4
11.4 Using Access Data FTK and Special Steps Pt. 5
11.5 Using Access Data FTK and Special Steps Pt. 6
11.6 Using Access Data FTK and Special Steps Pt. 7
11.7 Using Access Data FTK and Special Steps Pt. 8

Module 12: Using EnCase

12.0 EnCase Pt. 1
12.1 EnCase Pt. 2
12.2 EnCase Pt. 3

Module 13: Steganography

13.0 Stenography Pt. 1
13.1 Stenography Pt. 2
13.2 Stenography Pt. 3
13.3 Stenography Pt. 4

Module 14: Password Crackers

14.0 Passwords Pt. 1
14.1 Passwords Pt. 2
14.2 Passwords Pt. 3
14.3 Passwords Pt. 4

Module 15: Log Correlation

15.0 Log Correlation Pt. 1
15.1 Log Correlation Pt. 2
15.2 Log Correlation Pt. 3
15.3 Log Correlation Pt. 4
15.4 Log Correlation Pt. 5
15.5 Log Correlation Pt. 6

Module 16: Network Forensics

16.0 Network Forensics Pt. 1
16.1 Network Forensics Pt. 2
16.2 Network Forensics Pt. 3
16.3 Network Forensics Pt. 4

Module 17: Wireless Attacks

17.0 Wireless Attacks Pt. 1
17.1 Wireless Attacks Pt. 2
17.2 Wireless Attacks Pt. 3

Module 18: Web Attacks

18.0 Web Attacks Pt. 1
18.1 Web Attacks Pt. 2
18.2 Web Attacks Pt. 3
18.3 Web Attacks Pt. 4
18.4 Web Attacks Pt. 5
18.5 Web Attacks Pt. 6
18.6 Web Attacks Pt. 7
18.7 Web Attacks Pt. 8

Module 19: Email Crimes

19.0 Email Crimes Pt. 1
19.1 Email Crimes Pt. 2
19.2 Email Crimes Pt. 3
19.3 Email Crimes Pt. 4

Module 20: Mobile Investigation

20.0 Mobile Investigation Pt. 1
20.1 Mobile Investigation Pt. 2
20.2 Mobile Investigation Pt. 3
20.3 Mobile Investigation Pt. 4
20.4 Mobile Investigation Pt. 5

Module 21: Investigative Reports

21.0 Investigation Reports Pt. 1
21.1 Investigation Reports Pt. 2
21.2 Investigation Reports Pt. 3
21.3 Investigation Reports Pt. 4

Module 22: Expert Witness

22.0 Expert Witness Pt. 1
22.1 Expert Witness Pt. 2
22.2 Expert Witness Pt. 3

Training Features

With eCourses4You's e-learning system, certification has never been simpler! You can be starting your IT career or taking your current IT skills to the next level in just a few short weeks. Our award winning learning system gives you all of the benefits of a live class at just a fraction of the cost.

eCourses4You’s courses include:


Expert Instructor-Led Training

eCourses4You uses only the industry’s finest instructors in the IT industry. They have a minimum of 15 years real-world experience and are subject matter experts in their fields. Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.


Visual Demonstrations & Multimedia Presentations

Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. eCourses4You always focuses on real world scenarios and skill-set development.


Quizzes & Exam Simulators

eCourses4You’s custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. You will have practice quizzes after each module to ensure you are confident on the topic you have completed before proceeding.

This will allow you to gauge your effectiveness before moving to the next module in your course. eCourses4You Courses also include practice exams designed to replicate and mirror the environment in the testing center. These exams are on average 100 questions to ensure you are 100% prepared before taking your certification exam.


Social Learning & Networking

eCourses4You has designed a world class Learning Management System (LMS) This system allows you to interact and collaborate with other students and eCourses4You employees, form study groups, engage in discussions in our NOW@ Forums, rate and “like” different courses and stay up to date with all the latest industry knowledge through our forums, student contributions and announcement features. This LMS is unmatched in the industry and makes learning fun and enjoyable.

Flash Cards & Educational Games

eCourses4You knows that education is not a one size fits all approach. Students learn in different ways through different tools. That is why we provide Flash Cards and Education Games throughout our courses. This will allow you to train in ways that keep you engaged and focused. Each course will have dozens of Flash Cards so you can sharpen your skill-sets throughout your training as well as educational games designed to make sure your retention level of the materials is extremely high.

Navigation & Controls

eCourses4You’s self-paced training programs are designed in a modular fashion to allow you the flexibility to work with expert level instruction anytime 24/7. All courses are arranged in defined sections with navigation controls allowing you to control the pace of your training. This allows students to learn at their own pace around their schedule.

System Requirements

Minimum specifications for the computer are:


Microsoft Windows XP, or later
Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)


OSX/iOS 6 or later
Modern and up to date Browser (Firefox, Chrome, Safari)

All systems:

Internet bandwidth of 1Mb or faster
Flash player or a browser with HTML5 video capabilities (We recommend Google Chrome)