Course Objectives
The program is designed for IT professionals involved with information system security, computer forensics, and incident response. It will help fortify the application knowledge in digital forensics for forensic analysts, cybercrime investigators, cyber defence forensic analysts, incident responders, information technology auditors, malware analysts, security consultants, and chief security officers.
The program equips candidates with the necessary skills to proactively investigate complex security threats, allowing them to investigate, record, and report cybercrimes to prevent future attacks.
Skills that Participants will Gain from this Course:
- Gain Knowledge of Computer Forensics in Today’s World
- Gain a basic understanding and in-depth knowledge of Computer Forensics Investigation Process
- Understanding Hard Disks and File Systems
- Understanding Data Acquisition and Duplication
- Gain knowledge on Defeating Anti-Forensics Techniques
- Able to perform Windows, Linux and Mac Forensics
- Gain experience and extensive knowledge of Network Forensics and Investigating Web Attacks
- Gain knowledge of administering Dark Web, Database, Cloud, Malware, Mobile and IOT Forensics
- Investigate Email Crimes
Pre-requisites
Knowledge, Skills & Experience
It is recommended that the participant have at least 1 year of relevant working experience in IT industry with knowledge in the area of Ethical Hacking / network security.
Recommended courses prior to taking CHFI
- CompTIA A+
- CompTIA Network+
- CompTIA Security+
- ISACA Cybersecurity Fundamentals
- Identity and Access Management Essentials (SF)
- EC-Council Certified Network Defender (CND) (SF)
- EC-Council Certified Ethical Hacker (CEH) (SF)
Recommended for Career Path Advancement
- EC Council Computer Hacking Forensic Investigator (CHFI) (For Incident Response and Forensics)
- EC Council Certified Incident Handler (ECIH) (For Incident Response and Forensics)
- EC Council Certified SOC Analyst (CSA) (For SOC Operations)
- Cisco CCNA Cyber Security Operations (For SOC Operations)
- ISC2 Certified Information Systems Security Professional (CISSP) (For Security Engineer)
- Certificate of Cloud Auditing Knowledge (CCAK) (For Cloud Security)
- ISC2 Certified Cloud Security Professional (CCSP) (For Cloud Security)
Hardware & Software
This course will be conducted as a Virtual Live Class (VLC) via Zoom platform. Participants must own a zoom account and have a laptop or a desktop with “Zoom Client for Meetings” installed. This can be downloaded from https://zoom.us/download.
System Requirement |
Must Have:
Please ensure that your computer or laptop meets the following requirements.
Good to Have:
Not Recommended: Using tablets is not recommended due to their smaller screen size, which could cause eye strain and discomfort over the course of the program's duration. |
Course Outline
Module 01: Computer Forensics in Today’s World
Module 02: Computer Forensics Investigation Process
Module 03: Understanding Hard Disks and File Systems
Module 04: Data Acquisition and Duplication
Module 05: Defeating Anti-forensics Techniques
Module 06: Windows Forensics
Module 07: Linux and Mac Forensics
Module 08: Network Forensics
Module 09: Investigating Web Attacks
Module 10: Dark Web Forensics
Module 11: Database Forensics
Module 12: Cloud Forensics
Module 13: Investigating Email Crimes
Module 14: Malware Forensics
Module 15: Mobile Forensics
Module 16: IoT Forensics
Certificate Obtained and Conferred by
- Certificate of Completion from NTUC LearningHub
Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a Certificate of Completion from NTUC LearningHub.
- Statement of Attainment (SOA) from SkillsFuture Singapore
Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a SOA from SkillsFuture Singapore to certify that the participant has achieved the following Competency Standard(s):
ICT-OUS-3002-1.1 Cyber Forensics
- External Certification
After completing this course and upon passing the official “EC-Council Computer Hacking Forensic Investigator (CHFI)” certification exam, candidates will receive the official certification from EC Council. The certification is governed and maintained by EC Council. For more information: https://cert.eccouncil.org/computer-hacking-forensic-investigator.html
Categories
More Information
- NTUC LearningHub
Add a review