$500* off for (CEH/CHFI/Network+/CCNA/CND)!
Duration: 5 days / 40 hours
Time: 9am to 6pm
Course Code: CRS-Q-0037557-ICT
TPGateway Course Code: TGS-2019502958
Funding available for this course:
Enhanced Training Support for SMEs | NICF-SF | Post-Secondary Education Scheme (PSEA) | SkillsFuture Credit | SkillsFuture Mid-Career Enhanced Subsidy | Union Training Assistance Programme (UTAP) |
What Will Be Taught For This Computer Hacking Forensic Investigator Course?
EC-Council releases the most advanced Computer Forensic Investigation programme in the world. A SkillsFuture course, our NICF-CHFI – Computer Hacking Forensic Investigator V9 training in Singapore presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation. This is among the IT forensic courses in Singapore that enables you to acquire an in-depth understanding of the virtual forensics world.
Battles between corporations, governments, and countries are no longer fought using physical force. The cyber war has begun, and the consequences can be seen in everyday life. With the onset of sophisticated cyber-attacks, the need for advanced cyber security and investigation training is a mandate in the present day. This thus makes IT forensic courses especially necessary to train our community of info-comm professionals. If you or your organisation requires the knowledge or skills to identify, track, and prosecute the cybercriminals, then this is the course for you.
Our CHFI training, one of the most engaging and hands-on IT forensic courses in Singapore, helps students to excel in digital evidence acquisition, handling and analysis in a forensically sound manner. Acceptable in a court of law, these skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats and other intricate cases involving computer systems.
Learning Outcomes
Students going through this CHFI training in Singapore will learn:
- The computer forensic investigation process and the various legal issues involved
- Evidence searching, seizing and acquisition methodologies in a legal and forensically sound manner
- Different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category
- Roles of first responder, first responder toolkit, securing and evaluating electronic crime scene, conducting preliminary interviews, documenting electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, and reporting the crime scene
- How to set up a computer forensics lab and the tools involved in it
- Various file systems and how to boot a disk
- Gathering volatile and non-volatile information from Windows
- Data acquisition and duplication rules, validation methods and tools required
- How to recover deleted files and deleted partitions in Windows, Mac OS X, and Linux
- The process involved in forensic investigation using AccessData FTK and EnCase
- Steganography and its techniques, Steganalysis, and image file forensics
- Password Cracking Concepts, tools, types of password attacks and how to investigate password protected files
- Different types of log capturing, log management, time synchronisation, and log capturing tools
- How to investigate logs, network traffic, wireless attacks, and web attacks
- How to track e-mails and investigate e-mail crimes
- Mobile forensics and mobile forensics software and hardware tools
- How to write investigative Reports
Statement of Attainment (SOA) from SSG
Participants will receive the SOA from SSG upon completion of the CHFI training and assessment in Singapore.
*Terms and Conditions
- The promotion is valid till 31 March 2021.
- All classes must be completed by 30 June 2021.
- Promotion discount is based on full course fee.
- Discounted course fee must be paid before the promotional period ends.
- ST Engineering e-Services Pte Ltd reserves the right to adjust the class dates due to unforeseen circumstances. In the unlikely occurrence that the class is cancelled, participants may be offered to attend an alternative class dates at no additional administrative cost, subject to availability.
- Registrations are on a first-come, first-serve basis, subject to availability and Terms & Conditions.
- No cancellation or postponement is allowed once the registration is confirmed.
Module 01: Computer Forensics in Today’s World
- Understanding Computer Forensics
- Why and When Do You Use Computer Forensics?
- Cyber Crime (Types of Computer Crimes)
- Case Study
- Challenges Cyber Crimes Present For Investigators
- Cyber Crime Investigation
- Rules of Forensics Investigation
- Understanding Digital Evidence
- Types of Digital Evidence
- Characteristics of Digital Evidence
- Role of Digital Evidence
- Sources of Potential Evidence
- Rules of Evidence
- Forensics Readiness
- Computer Forensics as part of an Incident Response Plan
- Need for Forensic Investigator
- Roles and Responsibilities of Forensics Investigator
- What makes a Good Computer Forensics Investigator?
- Investigative Challenges
- Legal and Privacy Issues
- Code of Ethics
- Accessing Computer Forensics
Module 02: Computer Forensics Investigation Process
- Importance of Computer Forensics Process
- Phases Involved in the Computer Forensics Investigation Process
- Pre-investigation Phase
- Investigation Phase
- Post-investigation Phase
Module 03: Understanding Hard Disks and File Systems
- Hard Disk Drive Overview
- Disk Partitions and Boot Process
- Understanding File Systems
- RAID Storage System
- File System Analysis
Module 04: Data Acquisition and Duplication
- Data Acquisition and Duplication Concepts
- Static Acquisition
- Validate Data Acquisitions
- Acquisition Best Practices
Module 05: Defeating Anti-forensics Techniques
- What is Anti-Forensic?
- Anti-Forensics Techniques
Module 06: Operating System Forensics (Windows, Mac, Linux)
Introduction to OS Forensics
- Windows Forensics
- Collecting Volatile Information
- Collecting Non-Volatile Information
- Analyze the Windows thumbcaches
- Windows Memory Analysis
- Windows Registry Analysis
- Cache, Cookie, and History Analysis
- Windows File Analysis
- Metadata Investigation
- Text Based Logs
- Other Audit Events
- Forensic Analysis of Event Logs
- Windows Forensics Tools
- Linux Forensics
- Shell Commands
- Linux Log files
- Collecting Volatile Data
- Collecting Non-Volatile Data
- MAC Forensics
- Introduction to MAC Forensics
- MAC Forensics Data
- MAC Log Files
- MAC Directories
- MAC Forensics Tools
Module 07: Network Forensics
- Introduction to Network Forensics
- Fundamental Logging Concepts
- Event Correlation Concepts
- Network Forensic Readiness
- Network Forensics Steps
- Network Traffic Investigation
- Documenting the Evidence
- Evidence Reconstruction
Module 08: Investigating Web Attacks
- Introduction to Web Application Forensics
- Web Attack Investigation
- Investigating Web Server Logs
- Web Attack Detection Tools
- Tools for Locating IP Address
- WHOIS Lookup Tools
Module 09: Database Forensics
- Database Forensics and Its Importance
- MSSQL Forensics
- MySQL Forensics
Module 10: Cloud Forensics
- Introduction to Cloud Computing
- Cloud Forensics
Module 11: Malware Forensics
- Introduction to Malware
- Introduction to Malware Forensics
Module 12: Investigating Email Crimes
- Email System
- Email Crimes (Email Spamming, Mail Bombing/Mail Storm, Phishing, Email Spoofing, Crime via Chat Room, Identity Fraud/Chain Letter)
- Email Message
- Steps to Investigate Email Crimes and Violation
- Email Forensic Tools
- Laws and Acts against Email Crimes
Module 13: Mobile Phone Forensics
- Mobile Device Forensics
Module 14: Forensics Report Writing and Presentation
- Writing Investigation Reports
- Expert Witness Testimony
Assessment Format & Duration (only applicable for learner taking SF grant)
Assessment | Mode | Duration |
Practical Performance | Formative | 110 mins |
Written Assessment | Summative | 45 mins |
Total | 155 mins |
Who Should Attend This Computer Forensics Training?
The CHFI training is designed for all IT professionals in Singapore involved in information system security, computer forensics, and incident response. IT forensic courses are necessary to upskill our workforce of cyber professionals with the advent of attacks within the virtual world.
Pre-requisite
Participants are strongly recommended to attend the CEH course before enrolling into our CHFI training course in Singapore.
Reach out to us if you need more information about our CHFI training or other IT forensic courses we offer in Singapore.
w/o GST | w GST | |
Full Course Fee | $2,500 | $2,675 |
Discounted Fee* |
$2,000 | $2,140 |
Singapore Citizen & PR aged ≥ 21 years | $1,400 | $1,540 |
Singapore Citizen aged ≥ 40 years (SkillsFuture Mid-Career Enhancement Funding) |
$200 | $340 |
w/o GST | w GST | |
Full Course Fee | $2,500 | $2,675 |
Discounted Fee* |
$2,000 | $2,140 |
Singapore Citizen & PR aged ≥ 21 years | $1,400 | $1,540 |
Singapore Citizen aged ≥ 40 years (SkillsFuture Mid-Career Enhancement Funding) |
$200 | $340 |
w/o GST | w GST | |
Full Course Fee | $2,500 | $2,675 |
Discounted Fee* |
$2,000 | $2,140 |
Singapore Citizen & PR aged ≥ 21 years | $200 | $340 |
Singapore Citizen aged ≥ 40 years (SkillsFuture Mid-Career Enhancement Funding) |
$200 | $340 |
Exam:
Course fees listed above are inclusive of exam fees.
w/o GST | w GST | |
Retest Fee |
$300 | $321 |
Trainee shall be bound by the Terms and Conditions of any applicable funding scheme.
Please ensure that you have read our Terms and Conditions before submitting the enrolment form.
Please click on the course date to enrol.
- CL: Classroom Learning
- VILT: Virtual Instructor-Led Training
- GTR: Guaranteed To Run
- Sat: Saturday
- Wkn: Weekend