The CHFI: Certified Hacking Forensic Investigator training course is a completely ANSI-accredited and lab-focused program. This CHFI training is vendor-neutral training in digital forensics.

Course Price : $2795 Per Participant
Courses
Years of Experience
Global Learners
The CHFI: Certified Hacking Forensic Investigator training course is a completely ANSI-accredited and lab-focused program.
This CHFI training is vendor-neutral training in digital forensics. With this training, the participant will understand digital forensics, the detailed and best approach to digital forensics, and evidence analysis that revolves around Dark Web, IoT, and Cloud Forensics.
With the help of techniques and tools, the participant will learn to conduct digital investigations and groundbreaking digital forensics technologies.
This Certified Hacking Forensic Investigator training program is for IT professionals involved with information system security, computer forensics, and incident response.
It helps strengthen the application knowledge in digital forensics for forensic analysts, cybercrime investigators, cyber defense forensic analysts, incident responders, information technology auditors, malware analysts, security consultants, and chief security officers.
The CHFI training provides the essential skills to proactively investigate complicated security threats, allowing them to explore, record, and report cybercrimes to prevent future attacks.
|
|
|
|
|
|
|
|
Oops! For this course, there are currently no public schedules available. Clicking on “Notify Me” will allow you to express your interest.
For dates, times, and location customization of this course, get in touch with us.
This module describes the structure and capabilities of a SharePoint environment, and the major changes for IT professionals in SharePoint 2016. This module also describes the options available for deploying SharePoint 2016.
After completing this module, students will be able to:
This module describes how to gather business requirements, and the key elements of a successful information architecture project. This module also explains how to structure information within a SharePoint 2016 deployment and make it easy to find and retrieve.
Lab: Designing an information architecture – Part one
Lab: Creating an information architecture – Part two
After completing this module, students will be able to:
This module explains how to approach a logical architecture design and how to document it.
Lab: Designing a logical architecture
After completing this module, students will be able to:
This module describes the physical design requirements for SharePoint 2016, and the physical components necessary to fulfill the physical architecture design. It also explains the SharePoint farm topologies, and describes how to map a logical architecture design to a physical architecture design.
Lab: Designing a physical architecture
After completing this module, students will be able to:
This module explains how to install SharePoint 2016 in different topologies, script the installation, and configure a SharePoint 2016 environment. This module also explains how to configure the core farm-level settings in a SharePoint 2016 deployment.
Lab: Deploying and configuring SharePoint 2016 – Part one
Lab: Deploying and configuring SharePoint 2016 – Part two
After completing this module, students will be able to:
This module explains how to create web applications in SharePoint 2016 and how to configure these applications. It also explains how to create and configure site collections in SharePoint 2016 and SharePoint Online.
Lab: Creating and configuring web applications
Lab: Creating and configuring site collections
After completing this module, students will be able to:
This module describes the service application architecture in SharePoint 2016, and how to provision and manage service applications.
Lab: Planning and configuring service applications
After completing this module, students will be able to:
This module explains how to configure authorization in SharePoint 2016. It also explains how to configure site collection security in SharePoint 2016.
Lab: Managing users and groups
Lab: Securing content in SharePoint sites
After completing this module, students will be able to:
This module explains about the SharePoint 2016 authentication infrastructure, and how to configure claims, providers, and identity federation for SharePoint 2016. It also explains how to configure server-to-server authentication for SharePoint 2016.
Lab: Extend your SharePoint 2016 to support Secure Sockets Layer (SSL)
After completing this module, students will be able to:
This module explains how to secure a SharePoint 2016 deployment at the platform level, and how to configure farm-level security settings for a SharePoint 2016 deployment.
Lab: Securing a SharePoint 2016 deployment
After completing this module, students will be able to:
This module explains how to create and manage content types and content-type propagation. Additionally, it explains how to implement managed metadata in SharePoint web applications and site collections. It also explains how to configure the managed metadata service application in SharePoint 2016.
Lab: Configuring content-type propagation
Lab: Configuring and using the managed metadata service
After completing this module, students will be able to:
This module explains how to configure the User Profile service application, and how to manage user profiles and audiences.
Lab: Configuring user profiles
Lab: Configuring My Sites and audiences
After completing this module, students will be able to:
This module describes the Search Service Application and explains how to configure the Search service in SharePoint 2016. It also explains how to manage the search experience in SharePoint 2016.
Lab: Configuring Enterprise Search
Lab: Optimizing the search experience
After completing this module, students will be able to:
This module explains how to implement a monitoring plan for SharePoint 2016, and how to optimize the performance of a SharePoint 2016 deployment. It also explains how to plan for and configure SharePoint caching. Further, it explains how to identify and resolve problems in a SharePoint 2016 environment.
Lab: Monitoring a SharePoint 2016 deployment
Lab: Investigating page load times
After completing this module, students will be able to:
CHFI – Computer Hacking Forensics Investigator Certification empowers a person with skills and knowledge to recognize hacking attacks, to attain evidence needed to report the crime & the cyber-criminal and to run an analysis that secures people from further attacks.
This certification works on computer forensics from a vendor-neutral perspective which will strengthen the application knowledge. CHFI imparts supreme level of network security expertise for law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals and anybody who is concerned about the uprightness of the network infrastructure.
Step 1: Review the skills and knowledge required to certify.
Step 2: Recommended training for EC-Council Computer Hacking Forensic Investigator (CHFI) Certification:
Step 3: Take this exam and get certified.
The following individuals will benefit from CHFI:
IT professionals involved with incident responses, computer forensics, information system security and IT managers, e-Business Security professionals and Systems administrators.
Recommended good understanding of Certified Ethical Hacker (CEH) training course.
This CHFI – Computer Hacking Forensics Investigator Certification is valid for three years starting from the certification data. You must renew your certification before expiry date.
The cut off score for CHFI certification exam ranges from 60% to 85%.
After completing your Computer Hacking Forensic Investigator certification exam training, you will need to present certificate of attendance (COA) to EC-council to purchase the CHFI exam voucher.
Yes, you can extend EC-council’s CHFI certification exam voucher for three months by paying a fee of USD $35.