Computer Hacking Forensic Investigator (CHFI) course
Module 01: Introduction to Computer Forensics
Exploring Cybercrime
Cyber Law Fundamentals
Common Cyber Attacks
Digital Evidence Essentials
Types of Digital Forensics
Challenges in Cybercrime Investigations
Module 02: Computer Forensics Investigation Process
Principles of Digital Forensic Investigations
Chain of Custody and Standard Operating Procedures (SOP)
Laboratory Procedures and Crime Scene Investigation (CSI)
Investigative Checklist Preparation
Precautions During Search and Seizure
Equipment and Tools for Digital Forensics
Module 03: Exploring Hard Disk Architecture and File Systems
Hard Disk Architecture
Various File Systems Overview
Booting Process Explained
File Systems in Windows & Linux
Module 04: Data Acquisition and Duplication
Concepts of Data Acquisition
Rules and Procedures for Data Acquisition
Types of Data Acquisition Methods
Live vs. Dead Data Acquisition
Data Acquisition Formats
Live and Dead Data Acquisition on Windows & Linux
Module 05: Countering Anti-Forensics Techniques
Understanding Anti-Forensic Tactics
Pros and Cons of Steganography
Types and Basics of Steganography
Fundamentals of Steganographic Models
Data Sanitization Tools and Techniques
Password Cracking Methods
Recovery of Deleted Data
Overview of Encryption Methods
Module 06: Windows Forensics
Methodologies in Windows Forensics
Collecting Volatile and Non-Volatile Data
Analysis of Windows Forensic Data
Information Gathering Tools
Examination of Entire Files
Analysis of Network Information
Process Information Examination
Event Log Analysis
Understanding Metadata
Module 07: Linux and Mac Forensics
Methodologies in Linux Forensics
Collection of File System Information
Gathering Volatile and Non-Volatile Data
Retrieving Login History and Active Users
Capturing Hostname, Date, Time, and Uptime
Network Information Gathering
Open Port Information Collection
Analysis of Log Files in Linux OS
Collection of Suspicious Data
Network Information Collection
Module 08: Network Forensics
Introduction to Network Forensics
Network Forensics Process Overview
Analysis of Various Network Logs
Log File Analysis Techniques
Challenges in Log Management
Network Traffic Analysis
Information Gathering via Sniffing
Sniffing Tools and Utilities
Module 09: Investigating Web Forensics
Introduction to Web Application Forensics
Indicators of Web Attacks
Threats to Web Applications
Methodologies for Web Attack Investigations
Analysis of Web Logs (Client/Admin)
Module 10: Dark Web Forensics
Overview of Dark Web Forensics
Understanding Internet Layers
Architecture of the Tor Browser
Investigation Techniques for Tor
Module 11: Cloud Forensics
Cloud Computing Models
Threats and Attacks in Cloud Computing
Principles of Cloud Forensics
Investigating Cloud-Based Crimes
Module 12: Investigating Email Crimes
Overview of Email Server Architecture
Understanding Email Structures
Procedures for Email Crime Investigations
Email Analysis Techniques
Module 13: Malware Forensics
Introduction to Malware Forensics
Understanding Malware and its Capabilities
Types of Malware
Entry Points for Malware
Components of Malicious Software
Methods of Malware Analysis
Tools for Analyzing Malware
In-depth Study of Malware Cases
Module 14: Mobile Forensics
Introduction to Mobile Forensics
Importance of Mobile Forensics
Challenges in Mobile Forensics
Components of Mobile Devices
Process of Mobile Phone Evidence Extraction
Analysis of Removable and External Data Storage
Data Acquisition from iOS and Android Devices
Examination and Analysis of SIM Cards
Tools for Mobile Forensics Investigations
Module 15: IoT Forensics
Introduction to IoT Forensics
Understanding IoT and Associated Issues
IoT Architecture Overview
Objectives of IoT Forensics
Security Challenges in IoT
Attack Surfaces in IoT Systems