Shopping Cart  [0]

Call 800.698.5501

CHFI v9 Forensic Certification Boot Camp

ceh Certification Training
TrainingCamp Twitter Feed

CHFI Forensic Boot Camp

Our 5-day CHFI v9 Boot Camp teaches the specific security discipline of computer forensics from a vendor-neutral perspective.This detailed methodological approach to computer forensic and evidence analysis provides the necessary skillset for identification of intruder’s footprints and gathering necessary evidence for its prosecution.

This course will prepare you for the Official EC-Council EC0 312-49 Computer Hacking Forensic Investigator exam.

Whether you operate a team of 2 or 2,000 to tackle Cyber issues facing your organization, digital forensics must be a part of the equation as a critical skill and daily practice

Training Camp has been awarded EC-Council Accredited Training Center of the Year 2017, a reflection of our continued dedication to delivering excellence and quality across our full range of accelerated EC-Council courses. Read More

Enrollment Information

CEH Training Pricing View Pricing
CEH Certification Schedule Course Schedule


Duration: 5 days
Start Time: 8:30 AM CST
End Time: 5:30 PM CST
Review:6:00 PM+ CST
Exam Voucher: Included
Testing: ProctorU
GSA Catalog: GS-02F-0044T

Other Delivery Formats

Hosted CEH Boot Camp Private Group Training
CEHv9 Certification Training

Official EC-Council Training Includes:
  • Official CHFI v9 Courseware
  • Official CHFI Exam Voucher Prep Study Guide
  • VM Incident Labs
  • 40+ Real Time Labs

  • Training Camp Exclusive Add-ons:
  • Exam Support via ProctorU
  • Evening Review + Practice Exam
  • Exam Prep Study Guide
  • Pre-Exam Review Session

  • Training Camp offers the full spectrum of learning [delivery] options - providing our customers with end-to-end solutions to assist in achieving education goals.

    Instructor-Led Boot Camp
    Check out our dates and locations for this CHFI v9 Boot Camp Certification Boot Camp.

    DoD/Military Discounts
    We offer expanded pricing options for for Government & Military personnel.

    Group Training
    We can offer forensic training with onsite exam delivery to support your requirements.

    Ceh ethical hacking lab

    Updated CHFIv9 Courseware

    14 comprehensive modules and 39 labs that offer more than 400 new/updated tools, coverage of latest operating systems, and result oriented, descriptive and analytical lab manual. The student kit also contains several forensics investigation templates for evidence collection, chain-of custody, final investigation reports, etc.

    ceh Exam Practice Tests

    Exam Prep Evening Review & CHFI Practice Exams

    Our CHFI certification program includes value-added evening review sessions & constantly updated practice exam review drills - representative of the actual exam questions delivered during the official CHFI certification exam. This review session also covers computer forensics case studies to help understand the key concepts.

    ceh Exam

    Official CHFI Exam Prep (312-59)

    Because examination support is offered as part of the class, our students will have all the skills they need, and ready to get certified, guaranteed.

    What is CHFI (Computer Hacking Forensic Investigator)?

    CHFI v9, the latest version of the program has been designed for professionals handling digital evidence while investigating cybercrimes. It is developed by an experienced panel of subject matter experts and industry specialists, and also has set global standards for computer forensics best practices. In addition, it also aims at elevating the knowledge, understanding, and skill levels of in cyber security and forensics practitioners

    Is CHFI the right course for me?

    The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.

    What is Digital forensics?

    Digital forensics is a key component in Cyber Security. Many people hear the term forensics, or computer forensics, or digital forensics and instantly think, that’s just for law enforcement, but the truth is, digital forensics has a key place on every cyber security team. In fact, without it, chances are your organizations Security posture and maturity will fail to see its full potential.

    How do I get EC-Council CHFI certified?

    In order to be eligible to attempt the EC-Council CHFI exam, candidate can attend an official instructor-led training course with vendor provided exam voucher.

    What tools will I use in the CEH boot camp?

    Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. You will be provided with over 2200 commonly used hacking tools to immerse you into the hacker world.Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system, and to indemnify EC-Council with respect to the use or misuse of these tools, regardless of intent.

    What is next after CHFI?

    Suggested follow-on courses would be our Official (ISC)² 6-Day CISSP Certification Boot Camp or CCISO - Certified Chief Information Security Officer Boot Camp

    CHFI v9 Course Outline (CHFI Forensic Certification)

    Computer Forensics in Today’s World
    Computer Forensics Investigation Process
    Understanding Hard Disks and File Systems
    Operating System Forensics
    Defeating Anti-Forensics Techniques
    Data Acquisition and Duplication
    Network Forensics
    Investigating Web Attacks
    Database Forensics
    Cloud Forensics
    Malware Forensics
    Investigating Email Crimes
    Mobile Forensics
    Investigative Reports

    CHFI Certification Exam Review

    Training Camp Value-Add Exam Review
    Official CHFI Certification Exam (Onsite)

    CHFI/Computer Forensics Boot Camp Course Schedule/Pricing

    Click here CHFI v9/Computer Forensics Boot Camp course schedule and receive an instant price quote.

    CHFI v9 Course Skills Learned in Digital Forensics

    Perform incident response and forensics
    Perform electronic evidence collections
    Perform digital forensic acquisitions
    Perform bit-stream Imaging/acquiring of the digital media seized during the process of investigation
    Examine and analyze text, graphics, multimedia, and digital images
    Conduct thorough examinations of computer hard disk drives, and other electronic data storage media
    Recover information and electronic data from computer hard drives and other data storage devices
    Follow strict data and evidence handling procedures
    Maintain audit trail (i.e., chain of custody) and evidence integrity
    Work on technical examination, analysis and reporting of computer-based evidence
    Prepare and maintain case files
    Utilize forensic tools and investigative methods to find electronic data, including Internet use history, word processing documents, images and other files
    Gather volatile and non-volatile information from Windows, MAC and Linux
    Recover deleted files and partitions in Windows, Mac OS X, and Linux
    Perform keyword searches including using target words or phrases
    Investigate events for evidence of insider threats or attacks
    Support the generation of incident reports and other collateral
    Investigate and analyze all response activities related to cyber incidents
    Plan, coordinate and direct recovery activities and incident analysis tasks
    Examine all available information and supporting evidence or artefacts related to an incident or event
    Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents
    Conduct reverse engineering for known and suspected malware files
    Identify data, images and/or activity which may be the target of an internal investigation
    Perform detailed evaluation of the data and any evidence of activity in order to analyze the full circumstances and implications of the event
    Establish threat intelligence and key learning points to support pro-active profiling and scenario modelling
    Search file slack space where PC type technologies are employed
    File MAC times (Modified, Accessed, and Create dates and times) as evidence of access and event sequences
    Examine file type and file header information
    Review e-mail communications including web mail and Internet Instant Messaging programs
    Examine the Internet browsing history
    Generate reports which detail the approach, and an audit trail which documents actions taken to support the integrity of the internal investigation process
    Recover active, system and hidden files with date/time stamp information
    Crack (or attempt to crack) password protected files
    Perform anti-forensics detection
    Maintain awareness and follow laboratory evidence handling, evidence examination, laboratory safety, and laboratory security policy and procedures
    Play a role of first responder by securing and evaluating a cybercrime scene, conducting preliminary interviews, documenting crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, reporting of the crime scene
    Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
    Apply advanced forensic tools and techniques for attack reconstruction
    Perform fundamental forensic activities and form a base for advanced forensics
    Identify and check the possible source/incident origin
    Perform event co-relation
    Extract and analyze logs from various devices such as proxies, firewalls, IPSes, IDSes, Desktops, laptops, servers, SIM tools, routers, switches, AD servers, DHCP servers, Access Control Systems, etc.
    Ensure that reported incident or suspected weaknesses, malfunctions and deviations are handled with confidentiality
    Assist in the preparation of search and seizure warrants, court orders, and subpoenas
    Provide expert witness testimony in support of forensic examinations conducted by the examiner

    CHFI/Computer Forensics Boot Camp Course Schedule/Pricing

    Click here CHFI v9/Computer Forensics Boot Camp course schedule and receive an instant price quote.