Mob: +254 721 130 397, +254 780 342 333 | Email:


Course Description

EC-Council Computer Hacking Forensic Investigation (CHFI) is the method of detecting cyber-attacks and systematically extracting evidence to support the cyber-crime investigation report, and conducting periodic audits to prevent similar attacks in future. CHFI certification training validates an individual’s knowledge of computer forensics for reporting hacking attempts and attacks in the courts of law.

The CHFI V9 course is the most extensive and propelled accreditation program that summarizes the essential knowledge of digital forensic techniques and standard forensic tools to collect the intruder's footprints necessary for his investigation. The course delivers a few methodological ways to deal with digital forensics, including seizing, chain of custody, acquisition preservation, analysis and presentation of digital evidence. CHFI participants will be trained to lead successful procedures in different sorts of security incidents, for example, information ruptures, corporate secret activities, and other intricate cases involving computer systems. The certification will cover the different types of computer forensics programs that helps in detecting hacking attacks and properly extracting evidence to report the crime and conduct detailed audits for preventing future attacks.

CHFI course covers analysis tools and techniques that can be employed for a computer investigation for determining potential legal evidence against the perpetrator. Evidence might be related to a wide range of cyber-crimes, including but not limited to misuse of confidential data, theft of trade secrets, misuse or destruction of intellectual property, and online fraud. A computer forensics certification or CHFI certification v9 imparts core skills for data recovery that encompasses discovering hidden data residing in a system, and recovering lost, encrypted, deleted, or damaged data.


Upon Completion of this Course, you will accomplish the following:-

• Finding out about various kinds of cyber laws for investigating cyber-crimes.

• Analyzing digital evidence through rules of evidence by considering crime category.

• Roles of the first responder, first responder toolkit, securing and assessing electronic crime scene, directing preliminary interviews, archiving electronic crime scene, gathering and safeguarding electronic proof, bundling and transporting electronic crime scene, and detailing electronic crime scene.

• Setting up the computer forensics lab and creating investigation reports.

• Steganography, Steganalysis and image forensics.

• Kinds of log capturing, log management, Investigation logs, network traffic, wireless attacks, and web assaults.

• Gathering volatile and non-volatile data from Windows and recouping erased documents from Windows, Mac OS X, and Linux. Researching password secured documents by utilizing password cracking concepts and tools

Target Audience

The CHFI program is meant for professionals who are involved with information system security, computer forensics, and incident response:

• Computer Forensic Analyst

• Computer Network Defense (CND) Forensic Analyst

• Digital Forensic Examiner

• Forensic Analyst and technician

• Network Forensic Examiner

• Computer Crime Investigator

• Special Agent


• IT/forensics professionals with basic knowledge on IT/cyber security, computer forensics, and incident response

• Good Understanding of TCP/IP is required

• Prior completion of hacking course would be an advantage

• Before attending this CHFI course, students should have one year of experience managing Windows/Unix/Linux systems or have equivalent knowledge and skills


• 40 Hours

Course Outline

You’ll get the skills you need to identify a cyber-criminal, and gather the necessary evidence to prosecute. You'll also study the latest forensics tools and techniques.

Module 01: Computer forensics in today's world

Module 02: Computer forensics investigation process

Module 03: Understanding hard disks and file systems

Module 04: Data acquisition and duplication

Module 05: Defeating anti-forensics techniques

Module 06: Operating system forensics (Windows, Mac and Linux)

Module 07: Network forensics

Module 08: Investigating web attacks

Module 09: Database forensics

Module 10: Cloud forensics

Module 11: Malware forensics

Module 12: Investigating email crimes

Module 13: Mobile forensics

Module 14: Forensics report writing and presentation



Contact Information

Eco Bank Towers, 4th Floor Muindi Mbingu Street
P. O. Box 21857 - 00100 Nairobi

Mob: +254 780 342 333, +254 202 246145, 2246154 

Copyright © 2022 Learnovate Technologies Limited. All rights reserved