- 02 Aprile 2025
- 40 hours
- 01 June 2026
- Duration: 40 hours
Explore the EC-Council Computer Hacking Forensic Investigator (C|HFI) Program
Build Ultimate Investigative Skills And Organizational Forensic Readiness With
Advanced Strategies
Key Features & Critical Components
15 modules covering computer, network, mobile, cloud, IoT, malware, and dark web forensics
68 hands-on labs with 70+ GB of real evidence files
600+ forensic tools used by professionals
Extensive study materials – 2,100+ pages of courseware and 1,550+ pages of lab guides
40% lab time for real investigation practice
Globally recognized – ANAB-accredited, DoD 8140/8570 approved, NICE compliant
Regulatory alignment – ISO 27001, PCI DSS, HIPAA, SOX, and more
Job-ready design – built on real industry job roles and tasks
Course Outline
Module 01
Computer Forensics in Today’s World
Computer Forensics in Today’s World
Learn the role of digital forensics in modern cybercrime investigations.
Explore digital evidence sources and practice with forensic tools.
Key topics covered: Fundamentals of computer forensics, cybercrime types, digital evidence, forensic readiness, investigator roles, laws & standards.
Module 02
Computer Forensics Investigation Process
Computer Forensics Investigation Process
Understand the complete investigation lifecycle from evidence collection to courtroom presentation.
Simulate an end-to-end forensic investigation.
Key topics covered: First response, lab setup, investigation phases, search & seizure, chain of custody, reporting, expert witness testimony.
Module 03
Understanding Hard Disks and File Systems
Understanding Hard Disks and File Systems
Discover how data is stored, hidden, and recovered from storage devices.
Recover deleted files and analyze file systems using forensic tools.
Key topics covered: HDDs, SSDs, partitions, Windows/Linux/macOS file systems, RAID, NAS/SAN storage, hex editors, metadata analysis.
Module 04
Data Acquisition and Duplication
Data Acquisition and Duplication
Learn to properly capture and preserve digital evidence.
Create forensic images and validate evidence integrity.
Key topics covered: Data acquisition methods (live, dead, logical, bitstream), eDiscovery process, forensic imaging formats (RAW, AFF, E01).
Module 05
Defeating Anti-Forensics Techniques
Defeating Anti-Forensics Techniques
Learn how criminals hide their tracks and how to uncover them.
Identify hidden or destroyed evidence and recover data.
Key topics covered: Data wiping, file carving, password bypassing, steganography detection, encryption recovery, artifact wiping.
Module 06
Windows Forensics
Windows Forensics
Investigate Windows systems to uncover system and user activity.
Analyze Windows memory, logs, and artifacts to reconstruct activity.
Key topics covered: Memory and registry analysis, event logs, browser forensics, LNK files, ShellBags, Jump Lists, application artifacts.
Module 07
Linux and Mac Forensics
Linux and Mac Forensics
Collect and analyze forensic evidence from Linux and macOS systems.
Acquire and analyze evidence from Linux and macOS.
Key topics covered: Volatile & non-volatile data collection, memory forensics, log files, file systems (ext, HFS+, APFS).
Module 08
Network Forensics
Network Forensics
Learn how to investigate cyberattacks using network evidence.
Detect intrusions using Wireshark, Security Onion, and SIEM tools.
Key topics covered: Event correlation, IoCs, packet captures, IDS/IPS logs, SIEM analysis, wireless forensics.
Module 09
Malware Forensics
Malware Forensics
Analyze malware to understand its behavior and collect evidence.
Analyze malware samples in a controlled lab.
Key topics covered: Malware types, static & dynamic analysis, suspicious documents, ransomware investigation.
Module 10
Investigating Web Attacks
Investigating Web Attacks
Investigate attacks against websites and applications.
Analyze server logs to trace web-based attacks.
Key topics covered: OWASP Top 10, IIS/Apache log forensics, SQL injection, XSS, path traversal.
Module 11
Dark Web Forensics
Dark Web Forensics
Learn how investigators trace activities on the dark web.
Analyze Tor browser activity and recover hidden communications.
Key topics covered: Tor browser forensics, identifying artifacts, challenges of dark web analysis.
Module 12
Cloud Forensics
Cloud Forensics
Investigate incidents across major cloud platforms.
Investigate incidents in AWS, Azure, and GCP environments.
Key topics covered: Cloud forensics methodology, AWS, Azure, Google Cloud logs, challenges of evidence collection.
Module 13
Email and Social Media Forensics
Email and Social Media Forensics
Investigate crimes involving email and social media.
Trace phishing campaigns and analyze social media artifacts.
Key topics covered: Email header analysis, phishing investigations, email recovery, social media evidence collection.
Module 14
Mobile Forensics
Mobile Forensics
Extract and analyze evidence from smartphones and tablets.
Perform forensic acquisition and analysis of mobile devices.
Key topics covered: Android/iOS architecture, SIM forensics, rooting/jailbreaking, logical & physical acquisition, SQLite analysis.
Module 15
IoT Forensics
IoT Forensics
Investigate security incidents in smart and connected devices.
Acquire and analyze forensic data from IoT devices.
Key topics covered: IoT threats, forensic processes, smartwatches, drones, Alexa/Echo forensics, chip-off and JTAG.
Our Partners & Vendors







Ready to grow your cybersecurity career?
Training Prerequisites
Core Knowledge
Basic understanding of computer systems, operating systems (Windows, Linux, macOS), and file storage. Familiarity with fundamental cybersecurity concepts (threats, vulnerabilities, incident response). Awareness of digital evidence handling and its importance in investigations.
Technical Skills
Knowledge of IP addressing, routing, and basic network protocols (TCP/IP, DNS, DHCP, ARP, ICMP).
Ability to use basic network tools (ping, traceroute, nslookup, netstat, Wireshark basics). Understanding of common attack techniques (malware, phishing, denial of service, web attacks).
OS & Tools
Comfortable working with Windows, Linux, or macOS environments.
Ability to install software and use command-line utilities.
Understanding of file systems, user accounts, and permissions. Familiarity with basic forensic or security tools (preferred, but not mandatory).
Training & Register Details
TRAINING OVERVIEW
Computer Hacking Fornsic Investigator v11 (CHFI)
Course Price
By Request
Installments
upfront ₴15,000
+
5 months × ₴7,500
PrivatBank Credit
₴53,000
over 12 months

Training Duration: 5 days (40 hours)

Format: Instructor-Led Online

Level: Intermediate

Language: Ukrainian

Materials: English | 24 months valid

Labs: 24/7 180 days access

Exam Attempts: 1 offline
HOW TO REGISTER
1. Submit Your Application
Basic understanding of computer networks and protocols.
2. Intro Call
We’ll schedule a short call to learn more about your goals and expectations.
3. Confirm Your Spot
Get accepted and complete the paperwork. We’ll send you all the info you need.
4. Start Learning
Access your learning platform and get familiar with the materials.
5. Join the Community
Get access to the student chat, events, and mentorship opportunities.
Who is CHFI for?
Cybersecurity & Forensic Analysts
Develop advanced investigation skills to uncover digital evidence and trace cybercrimes.
Law Enforcement & Government Agencies
Trusted by police, defense, and regulatory bodies worldwide for professional cybercrime investigation.
Enterprises & SOC Teams
Enhance organizational ability to investigate breaches, fraud, and insider threats.
Educators & Trainers
Bring globally recognized forensic investigation training into academic and corporate programs.
FAQ
What is CHFI v11?
CHFI v11 is a globally recognized certification program that teaches how to investigate cybercrimes, collect digital evidence, and perform forensic analysis on computers, networks, mobile devices, and the cloud.
Who should take this course?
It’s designed for cybersecurity professionals, SOC teams, law enforcement, government agencies, auditors, and anyone involved in digital crime investigations.
Do I need prior experience to enroll?
Yes, a basic understanding of computers, networks, and cybersecurity concepts is recommended. Prior training such as CEH (Certified Ethical Hacker) or similar knowledge is helpful.
What topics are covered in CHFI v11?
The course covers digital evidence collection, data recovery, Windows/Linux/Mac forensics, network and malware analysis, dark web investigations, cloud forensics, mobile and IoT investigations.
How practical is the training?
Very practical — you will work on 68+ labs, use 600+ forensic tools, and practice with 70 GB of real evidence files. Around 40% of the course is hands-on.
What certification do I receive?
After completing the course and passing the exam (312-49), you will earn the EC-Council CHFI v11 certification, accredited by ANSI/ANAB and recognized worldwide.
