CHFI Course – Computer Hacking Forensics Investigator (ECC 312-49)

Take an extra 30% off this course! No coupon needed; auto applies in cart.


Sale Ends Soon

  • 00Days
  • 00Hours
  • 00Minutes
  • 00Seconds

This CHFI course will cover the security discipline of computer forensics from a vendor-neutral perspective and work towards preparing students to become Forensic Investigators in Computer Hacking.

18  Training Hours
133 Videos
22  Topics
62 Practice Questions

Course Description

Learn to be a computer hacking forensics investigator (CHFI)

Our CHFI Course – Computer Hacking Forensics Investigator (ECC 312-49) course will help you to gain knowledge in the specific security discipline of computer forensics from a vendor-neutral perspective and work towards becoming a Forensic Investigator in Computer Hacking. This course will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure. Prepare for the CHFI ECC 312-49 exam.

The “Ethical Hacking” and “Forensic Investigator in Computer Hacking” course(s) are unofficial programs that have been developed by ITU independently of EC-Council. EC-Council has not been endorsed, sponsored or certified this material at any time whatsoever. Usage of these material/books does not provide any guarantee of passing the EC-Council exam.

About Computer Hacking Forensics Investigator

Do you have what it takes to be a Computer Hacking Forensic Investigator? CHFI is a DoD 8570 / 8140 approved certification for cybersecurity professionals, and the process involves detecting hacking attacks and extracting evidence to report crimes. It's also used in audits to prevent future attacks from occurring. Governments, police departments, and corporations around the world are using this computer investigation technique with EC-Council’s CHFI certification as proof of these skills.

About our CHFI video training

With the comprehensive CHFI training you'll receive through ITU, you will be better equipped to identify and apprehend cybercrime culprits. You'll develop effective strategies for searching and seizing, as well as chain-of-custody acquisition, preservation, analysis and reporting of digital evidence that meet legal standards. By taking this vendor-neutral training course your knowledge base will be sufficiently primed so that when it comes time for sitting for the official CHFI certification exam – you are ready!

By obtaining the CHFI – Computer Hacking Forensic Investigator certification, you can demonstrate your capability to detect cyber breaches, properly extract and save digital evidence from computers and storage devices, as well as understand how hackers execute their attacks.

Who should obtain CHFI Certification?

Designed specifically for IT Managers, Law enforcement officers, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal representatives & employees of Banking and Insurance as well as other professional industries – this expert-level cybersecurity certification is a must have.

About 312-49 Exam Questions, format, duration, and passing score

  •  Duration is 240 minutes for the exam
  • There are 150 questions
  • multiple-choice format
  • A score of 70% is required to pass and receive your certification
  • Exam is offered vis Pearson VUE testing centers  

Your Training Instructor

Dean Bushmiller

Dean Bushmiller

Lead Instructor for Expanding Security

Dean has had fun for the past 20 years learning and teaching everything he can in technology and security. His consulting experience in accounting systems, inventory control, migrations, and patch management has breathed life into his 12 years in the class room. Dean is a courseware developer who specializes in CISSP and security training. He is the lead instructor for Expanding Security and teaches online as his main job. As a non-military person, he is a proud recipient of six mission coins.

Course Outline

Computer Hacking Forensic Investigator (CHFI) Course Outline

Module 1: Computer Forensics Introduction
  •    Intro To Course-Part1
  •    Intro To Course-Part2
  •    Intro To Course-Part3
  •    Intro To Course-Part4
  •    Intro To Course-Part5
  •    Intro To Forensics-Part1
  •    Intro To Forensics-Part2
  •    Intro To Forensics-Part3
  •    Intro To Forensics-Part4
  •    Intro To Forensics-Part5
  •    Intro To Forensics-Part6
  •    Intro To Forensics-Part7
  •    Intro To Forensics-Part8
Module 2: Forensics Investigation Process
  •    Forensics Investigation Process-Part1
  •    Forensics Investigation Process-Part2
  •    Forensics Investigation Process-Part3
  •    Forensics Investigation Process-Part4
  •    Forensics Investigation Process-Part5
  •    Forensics Investigation Process-Part6
  •    Forensics Investigation Process-Part7
  •    Forensics Investigation Process-Part8
  •    Forensics Investigation Process-Part9
  •    Forensics Investigation Process-Part10
Module 3: Searching and Seizing
  •    Searching And Seizing-Part1
  •    Searching And Seizing-Part2
  •    Searching And Seizing-Part3
  •    Searching And Seizing-Part4
  •    Searching And Seizing-Part5
Module 4: Digital Evidence
  •    Digital Evidence-Part1
  •    Digital Evidence-Part2
  •    Digital Evidence-Part3
  •    Digital Evidence-Part4
  •    Digital Evidence-Part5
  •    Digital Evidence-Part6
  •    Digital Evidence-Part7
Module 5: First Responder Procedures
  •    First Responder Procedures-Part1
  •    First Responder Procedures-Part2
  •    First Responder Procedures-Part3
  •    First Responder Procedures-Part4
  •    First Responder Procedures-Part5
  •    First Responder Procedures-Part6
  •    First Responder Procedures-Part7
  •    First Responder Procedures-Part8
Module 6: Forensics Lab
  •    Forensic Lab-Part1
  •    Forensic Lab-Part2
  •    Forensic Lab-Part3
  •    Forensic Lab-Part4
  •    Forensic Lab-Part5
Module 7: Hard Disks and File Systems
  •    Hard Disks And File Systems-Part1
  •    Hard Disks And File Systems-Part2
  •    Hard Disks And File Systems-Part3
  •    Hard Disks And File Systems-Part4
  •    Hard Disks And File Systems-Part5
  •    Hard Disks And File Systems-Part6
  •    Hard Disks And File Systems-Part7
  •    Hard Disks And File Systems-Part8
  •    Hard Disks And File Systems-Part9
  •    Hard Disks And File Systems-Part10
Module 8: Windows Forensics
  •    Windows Forensics-Part1
  •    Windows Forensics-Part2
  •    Windows Forensics-Part3
  •    Windows Forensics-Part4
  •    Windows Forensics-Part5
  •    Windows Forensics-Part6
  •    Windows Forensics-Part7
  •    Windows Forensics-Part8
  •    Windows Forensics-Part9
  •    Windows Forensics-Part10
Module 9: Data Acquisition and Duplication
  •    Data Acquisition And Duplication-Part1
  •    Data Acquisition And Duplication-Part2
  •    Data Acquisition And Duplication-Part3
  •    Data Acquisition And Duplication-Part4
  •    Data Acquisition And Duplication-Part5
  •    Data Acquisition And Duplication-Part6
  •    Data Acquisition And Duplication-Part7
Module 10: Recovering Deleted Files and Partitions
  •    Recovering Deleted Files And Partitions-Part1
  •    Recovering Deleted Files And Partitions-Part2
Module 11: Using Access Data FTK
  •    Using Access Data FTK And Special Steps-Part1
  •    Using Access Data FTK And Special Steps-Part2
  •    Using Access Data FTK And Special Steps-Part3
  •    Using Access Data FTK And Special Steps-Part4
  •    Using Access Data FTK And Special Steps-Part5
  •    Using Access Data FTK And Special Steps-Part6
  •    Using Access Data FTK And Special Steps-Part7
  •    Using Access Data FTK And Special Steps-Part8
Module 12: Using EnCase
  •    EnCase-Part1
  •    EnCase-Part2
  •    EnCase-Part3
Module 13: Steganography
  •    Stenography-Part1
  •    Stenography-Part2
  •    Stenography-Part3
  •    Stenography-Part4
Module 14: Password Crackers
  •    Passwords-Part1
  •    Passwords-Part2
  •    Passwords-Part3
  •    Passwords-Part4
Module 15: Log Correlation
  •    Log Correlation-Part1
  •    Log Correlation-Part2
  •    Log Correlation-Part3
  •    Log Correlation-Part4
  •    Log Correlation-Part5
  •    Log Correlation-Part6
Module 16: Network Forensics
  •    Network Forensics-Part1
  •    Network Forensics-Part2
  •    Network Forensics-Part3
  •    Network Forensics-Part4
Module 17: Wireless Attacks
  •    Wireless Attacks-Part1
  •    Wireless Attacks-Part2
  •    Wireless Attacks-Part3
Module 18: Web Attacks
  •    Web Attacks-Part1
  •    Web Attacks-Part2
  •    Web Attacks-Part3
  •    Web Attacks-Part4
  •    Web Attacks-Part5
  •    Web Attacks-Part6
  •    Web Attacks-Part7
  •    Web Attacks-Part8
Module 19: Email Crimes
  •    Email Crimes-Part1
  •    Email Crimes-Part2
  •    Email Crimes-Part3
  •    Email Crimes-Part4
Module 20: Mobile Investigation
  •    Mobile Investigation-Part1
  •    Mobile Investigation-Part2
  •    Mobile Investigation-Part3
  •    Mobile Investigation-Part4
  •    Mobile Investigation-Part5
Module 21: Investigative Reports
  •    Investigation Reports-Part1
  •    Investigation Reports-Part2
  •    Investigation Reports-Part3
  •    Investigation Reports-Part4
Module 22: Expert Witness
  •    Expert Witness-Part1
  •    Expert Witness-Part2
  •    Expert Witness-Part3
CHFI Course
CHFI Course – Computer Hacking Forensics Investigator (ECC 312-49)


This CHFI course will cover the security discipline of computer forensics from a vendor-neutral perspective and work towards preparing students to become Forensic Investigators in Computer Hacking.

Additional Options to Access This Training
This training is also part of our extensive training library containing over 225 courses, 12,000+ videos and over 19,000 practice test questions.
Monthly All-Access Subscription
$39.00 / month

A great option at an affordable monthly price.

Annual All-Access Subscription
$229 / year

A discounted price when paying for your All Access library on an annual basis.

Lifetime All-Access Library
$379 One time payment

Exceptional Value. Pay once, never have to buy IT training again.

Related Courses


In this Microsoft 70-410: Installing and Configuring Windows Server course you will learn how to install and configure servers, configure server roles and features, configure Hyper-V., and deploy and configure core network services. This course will also teach you how to install and administer Active Directory as well as create and manage Group Policy.


In this Microsoft 70-489: Developing Sharepoint Advanced Solutions course you will learn how to create efficient applications for Sharepoint 2013, work with managed metadata solutions, work with the search service, implement enterprise content management, develop publishing sites, and interact with business continuity services.


Ready to jumpstart your tech career? The Microsoft MTA 98-367 – Security Fundamentals course provides the necessary skills and knowledge for you to ace the Microsoft MTA 98-367 exam. Developed by experts, this training offers a comprehensive overview of essential technology concepts from Microsoft Technology Associate (MTA) certification exams which are set up to verify basic understandings needed when beginning work with Windows technologies.


The CompTIA A+ 220-1001 & 220-1002 training for the Core Series covers topics that are growing in IT support, including expanded content on security baselines and a different way of assessing competence in operational procedures. ITU’s online learning environment is ideal for those with a busy schedule, offering convenience and flexibility, study when you want. 


25% OFF

Sign up for updates, discounts, and more.