$500* off for (CEH/CHFI/Network+/CCNA/CND)!

Duration: 5 days / 40 hours
Time: 9am to 6pm
Course Code: CRS-Q-0037557-ICT

TPGateway Course Code: TGS-2019502958


Funding available for this course:

Enhanced Training Support for SMEs NICF-SF Post-Secondary Education Scheme (PSEA) SkillsFuture Credit SkillsFuture Mid-Career Enhanced Subsidy Union Training Assistance Programme (UTAP) 


What Will Be Taught For This Computer Hacking Forensic Investigator Course?

EC-Council releases the most advanced Computer Forensic Investigation programme in the world. A SkillsFuture course, our NICF-CHFI – Computer Hacking Forensic Investigator V9 training in Singapore presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation. This is among the IT forensic courses in Singapore that enables you to acquire an in-depth understanding of the virtual forensics world.

Battles between corporations, governments, and countries are no longer fought using physical force. The cyber war has begun, and the consequences can be seen in everyday life. With the onset of sophisticated cyber-attacks, the need for advanced cyber security and investigation training is a mandate in the present day. This thus makes IT forensic courses especially necessary to train our community of info-comm professionals. If you or your organisation requires the knowledge or skills to identify, track, and prosecute the cybercriminals, then this is the course for you.

Our CHFI training, one of the most engaging and hands-on IT forensic courses in Singapore, helps students to excel in digital evidence acquisition, handling and analysis in a forensically sound manner. Acceptable in a court of law, these skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats and other intricate cases involving computer systems.

Learning Outcomes

Students going through this CHFI training in Singapore will learn:

  • The computer forensic investigation process and the various legal issues involved
  • Evidence searching, seizing and acquisition methodologies in a legal and forensically sound manner
  • Different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category
  • Roles of first responder, first responder toolkit, securing and evaluating electronic crime scene, conducting preliminary interviews, documenting electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, and reporting the crime scene
  • How to set up a computer forensics lab and the tools involved in it
  • Various file systems and how to boot a disk
  • Gathering volatile and non-volatile information from Windows
  • Data acquisition and duplication rules, validation methods and tools required
  • How to recover deleted files and deleted partitions in Windows, Mac OS X, and Linux
  • The process involved in forensic investigation using AccessData FTK and EnCase
  • Steganography and its techniques, Steganalysis, and image file forensics
  • Password Cracking Concepts, tools, types of password attacks and how to investigate password protected files
  • Different types of log capturing, log management, time synchronisation, and log capturing tools
  • How to investigate logs, network traffic, wireless attacks, and web attacks
  • How to track e-mails and investigate e-mail crimes
  • Mobile forensics and mobile forensics software and hardware tools
  • How to write investigative Reports


Statement of Attainment (SOA) from SSG

Participants will receive the SOA from SSG upon completion of the CHFI training and assessment in Singapore.

*Terms and Conditions

  • The promotion is valid till 31 March 2021.
  • All classes must be completed by 30 June 2021.
  • Promotion discount is based on full course fee.
  • Discounted course fee must be paid before the promotional period ends.
  • ST Engineering e-Services Pte Ltd reserves the right to adjust the class dates due to unforeseen circumstances. In the unlikely occurrence that the class is cancelled, participants may be offered to attend an alternative class dates at no additional administrative cost, subject to availability.
  • Registrations are on a first-come, first-serve basis, subject to availability and Terms & Conditions.
  • No cancellation or postponement is allowed once the registration is confirmed.


Module 01: Computer Forensics in Today’s World

  • Understanding Computer Forensics
  • Why and When Do You Use Computer Forensics?
  • Cyber Crime (Types of Computer Crimes)
  • Case Study
  • Challenges Cyber Crimes Present For Investigators
  • Cyber Crime Investigation
  • Rules of Forensics Investigation
  • Understanding Digital Evidence
  • Types of Digital Evidence
  • Characteristics of Digital Evidence
  • Role of Digital Evidence
  • Sources of Potential Evidence
  • Rules of Evidence
  • Forensics Readiness
  • Computer Forensics as part of an Incident Response Plan
  • Need for Forensic Investigator
  • Roles and Responsibilities of Forensics Investigator
  • What makes a Good Computer Forensics Investigator?
  • Investigative Challenges
  • Legal and Privacy Issues
  • Code of Ethics
  • Accessing Computer Forensics

Module 02: Computer Forensics Investigation Process

  • Importance of Computer Forensics Process
  • Phases Involved in the Computer Forensics Investigation Process
  • Pre-investigation Phase
  • Investigation Phase
  • Post-investigation Phase

Module 03: Understanding Hard Disks and File Systems

  • Hard Disk Drive Overview
  • Disk Partitions and Boot Process
  • Understanding File Systems
  • RAID Storage System
  • File System Analysis

Module 04: Data Acquisition and Duplication

  • Data Acquisition and Duplication Concepts
  • Static Acquisition
  • Validate Data Acquisitions
  • Acquisition Best Practices

Module 05: Defeating Anti-forensics Techniques

  • What is Anti-Forensic?
  • Anti-Forensics Techniques

Module 06: Operating System Forensics (Windows, Mac, Linux)

Introduction to OS Forensics

  • Windows Forensics
    • Collecting Volatile Information
    • Collecting Non-Volatile Information
    • Analyze the Windows thumbcaches
    • Windows Memory Analysis
    • Windows Registry Analysis
    • Cache, Cookie, and History Analysis
    • Windows File Analysis
    • Metadata Investigation
    • Text Based Logs
    • Other Audit Events
    • Forensic Analysis of Event Logs
    • Windows Forensics Tools

  • Linux Forensics
    • Shell Commands
    • Linux Log files
    • Collecting Volatile Data
    • Collecting Non-Volatile Data

  • MAC Forensics
    • Introduction to MAC Forensics
    • MAC Forensics Data
    • MAC Log Files
    • MAC Directories
    • MAC Forensics Tools

Module 07: Network Forensics

  • Introduction to Network Forensics
  • Fundamental Logging Concepts
  • Event Correlation Concepts
  • Network Forensic Readiness
  • Network Forensics Steps
  • Network Traffic Investigation
  • Documenting the Evidence
  • Evidence Reconstruction

Module 08: Investigating Web Attacks

  • Introduction to Web Application Forensics
  • Web Attack Investigation
  • Investigating Web Server Logs
  • Web Attack Detection Tools
  • Tools for Locating IP Address
  • WHOIS Lookup Tools

Module 09: Database Forensics

  • Database Forensics and Its Importance
  • MSSQL Forensics
  • MySQL Forensics

Module 10: Cloud Forensics

  • Introduction to Cloud Computing
  • Cloud Forensics

Module 11: Malware Forensics

  • Introduction to Malware
  • Introduction to Malware Forensics

Module 12: Investigating Email Crimes

  • Email System
  • Email Crimes (Email Spamming, Mail Bombing/Mail Storm, Phishing, Email Spoofing, Crime via Chat Room, Identity Fraud/Chain Letter)
  • Email Message
  • Steps to Investigate Email Crimes and Violation
  • Email Forensic Tools
  • Laws and Acts against Email Crimes

Module 13: Mobile Phone Forensics

  • Mobile Device Forensics

Module 14: Forensics Report Writing and Presentation

  • Writing Investigation Reports
  • Expert Witness Testimony

Assessment Format & Duration (only applicable for learner taking SF grant)

Assessment Mode Duration
Practical Performance Formative 110 mins
Written Assessment Summative 45 mins
Total 155 mins

Who Should Attend This Computer Forensics Training?

The CHFI training is designed for all IT professionals in Singapore involved in information system security, computer forensics, and incident response. IT forensic courses are necessary to upskill our workforce of cyber professionals with the advent of attacks within the virtual world.


Participants are strongly recommended to attend the CEH course before enrolling into our CHFI training course in Singapore.


Reach out to us if you need more information about our CHFI training or other IT forensic courses we offer in Singapore.

  w/o GST w GST
Full Course Fee $2,500 $2,675
Discounted Fee*
$2,000 $2,140
Singapore Citizen & PR aged ≥ 21 years $1,400 $1,540
Singapore Citizen aged ≥ 40 years
(SkillsFuture Mid-Career Enhancement Funding)
$200 $340


  w/o GST w GST
Full Course Fee $2,500 $2,675
Discounted Fee*
$2,000 $2,140
Singapore Citizen & PR aged ≥ 21 years $1,400 $1,540
Singapore Citizen aged ≥ 40 years
(SkillsFuture Mid-Career Enhancement Funding)
$200 $340


  w/o GST w GST
Full Course Fee $2,500 $2,675
Discounted Fee*
$2,000 $2,140
Singapore Citizen & PR aged ≥ 21 years $200 $340
Singapore Citizen aged ≥ 40 years
(SkillsFuture Mid-Career Enhancement Funding)
$200 $340



Course fees listed above are inclusive of exam fees.

  w/o GST w GST
Retest Fee
$300 $321


Trainee shall be bound by the Terms and Conditions of any applicable funding scheme.

Please ensure that you have read our Terms and Conditions before submitting the enrolment form.

Please click on the course date to enrol.

  • CL: Classroom Learning
  • VILT: Virtual Instructor-Led Training
  • GTR: Guaranteed To Run
  • Sat: Saturday
  • Wkn: Weekend
Note: Courses are conducted via classroom unless stated otherwise beside the course dates.