Computer Hacking Forensics Investigator - ITU Online
Get Lifetime Training At 60% Off

Future proof your IT career with our LIFETIME IT training option.  Start today with over 2,500 hours of focused IT training.  Plus, you’ll receive all new and updated content for life at no additional cost.

Lock In At Our Lowest Price Ever: $14.99/month for 2,500+ hours of IT training.
Limited time only. Enroll now, cancel anytime!

Computer Hacking Forensics Investigator

This CHFI course will cover the security discipline of computer forensics from a vendor-neutral perspective and work towards preparing students to become Forensic Investigators in Computer Hacking.

Included In This Course

Included In This Course

Total Hours
18  Training Hours
Computer Hacking Forensics Investigator
133 On-demand Videos
Closed Caption

Closed Captions

Course Topics
22  Topics
Prep Questions
62 Prep Questions
Computer Hacking Forensics Investigator

Certificate of Completion

Course Description

CHFI Course – Computer Hacking Forensics Investigator (ECC 312-49)

Our CHFI Course – Computer Hacking Forensics Investigator (ECC 312-49) course will help you to gain knowledge in the specific security discipline of computer forensics from a vendor-neutral perspective and work towards becoming a Forensic Investigator in Computer Hacking. This course will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure. Prepare for the CHFI ECC 312-49 exam.

The “Ethical Hacking” and “Forensic Investigator in Computer Hacking” course(s) are unofficial programs that have been developed by ITU independently of EC-Council. EC-Council has not been endorsed, sponsored or certified this material at any time whatsoever. Usage of these material/books does not provide any guarantee of passing the EC-Council exam.

About Computer Hacking Forensics Investigator

Do you have what it takes to be a Computer Hacking Forensic Investigator? CHFI is a DoD 8570 / 8140 approved certification for cybersecurity professionals, and the process involves detecting hacking attacks and extracting evidence to report crimes. It’s also used in audits to prevent future attacks from occurring. Governments, police departments, and corporations around the world are using this computer investigation technique with EC-Council’s CHFI certification as proof of these skills.

About our CHFI video training

With the comprehensive CHFI training you’ll receive through ITU, you will be better equipped to identify and apprehend cybercrime culprits. You’ll develop effective strategies for searching and seizing, as well as chain-of-custody acquisition, preservation, analysis and reporting of digital evidence that meet legal standards. By taking this vendor-neutral training course your knowledge base will be sufficiently primed so that when it comes time for sitting for the official CHFI certification exam – you are ready!

By obtaining the CHFI – Computer Hacking Forensic Investigator certification, you can demonstrate your capability to detect cyber breaches, properly extract and save digital evidence from computers and storage devices, as well as understand how hackers execute their attacks.

Who should obtain CHFI Certification?

Designed specifically for IT Managers, Law enforcement officers, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal representatives & employees of Banking and Insurance as well as other professional industries – this expert-level cybersecurity certification is a must have.

About 312-49 Exam Questions, format, duration, and passing score

  •  Duration is 240 minutes for the exam
  • There are 150 questions
  • multiple-choice format
  • A score of 70% is required to pass and receive your certification
  • Exam is offered vis Pearson VUE testing centers  

Frequently Asked Questions About CHFI Course – Computer Hacking Forensics Investigator (ECC 312-49)

What will I learn in this CHFI Course?

In this course, you’ll dive deep into the world of computer forensics from a vendor-neutral perspective. The goal is to prepare you to become a Forensic Investigator in Computer Hacking. The course covers a broad range of topics, including the forensics investigation process, digital evidence, first responder procedures, network forensics, and more. By the end, you’ll be prepped for the CHFI ECC 312-49 exam.

Who is this course best suited for?

This course is designed for law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, security professionals, and really, anyone who is concerned about the integrity of the network infrastructure. If you’re looking to step up your game in cybersecurity, this course is for you​.

Who’s the instructor for this course?

The course is led by Dean Bushmiller, who has 20 years of experience in technology and security. He’s a specialist in CISSP and security training and has brought his consulting experience in accounting systems, inventory control, migrations, and patch management to the classroom. Dean teaches online as his main job and has a knack for making complex concepts accessible.

What kind of certification will I get after completing this course?

After successfully completing the course and passing the exam with a score of 70% or higher, you’ll receive the CHFI (Computer Hacking Forensics Investigator) certification. This certification is recognized by the DoD and widely used by governments, police departments, and corporations around the world as proof of advanced computer investigation skills.

What does the exam look like?

The exam is 240 minutes long and contains 150 questions in a multiple-choice format. You’ll need to score 70% or higher to pass and receive your certification. You can take the exam at Pearson VUE testing centers.

How is the course structured?

The course is divided into 22 modules, each focusing on a different aspect of computer hacking forensics investigation. You’ll find topics like ‘Forensics Investigation Process’, ‘Digital Evidence’, ‘First Responder Procedures’, ‘Network Forensics’, and ‘Investigative Reports’ among others. Each module is broken down into several parts, making it easy to digest and follow along.

Proudly Display
Your Achievement

Upon completion of your training, you’ll receive a personalized certificate of completion to help validate to others your new skills.
Example Certificate

Course Outline

Computer Hacking Forensic Investigator (CHFI) Course Content

Module 1: Computer Forensics Introduction

  •    Intro To Course-Part1

  •    Intro To Course-Part2

  •    Intro To Course-Part3

  •    Intro To Course-Part4

  •    Intro To Course-Part5

  •    Intro To Forensics-Part1

  •    Intro To Forensics-Part2

  •    Intro To Forensics-Part3

  •    Intro To Forensics-Part4

  •    Intro To Forensics-Part5

  •    Intro To Forensics-Part6

  •    Intro To Forensics-Part7

  •    Intro To Forensics-Part8

Module 2: Forensics Investigation Process

  •    Forensics Investigation Process-Part1

  •    Forensics Investigation Process-Part2

  •    Forensics Investigation Process-Part3

  •    Forensics Investigation Process-Part4

  •    Forensics Investigation Process-Part5

  •    Forensics Investigation Process-Part6

  •    Forensics Investigation Process-Part7

  •    Forensics Investigation Process-Part8

  •    Forensics Investigation Process-Part9

  •    Forensics Investigation Process-Part10

Module 3: Searching and Seizing

  •    Searching And Seizing-Part1

  •    Searching And Seizing-Part2

  •    Searching And Seizing-Part3

  •    Searching And Seizing-Part4

  •    Searching And Seizing-Part5

Module 4: Digital Evidence

  •    Digital Evidence-Part1

  •    Digital Evidence-Part2

  •    Digital Evidence-Part3

  •    Digital Evidence-Part4

  •    Digital Evidence-Part5

  •    Digital Evidence-Part6

  •    Digital Evidence-Part7

Module 5: First Responder Procedures

  •    First Responder Procedures-Part1

  •    First Responder Procedures-Part2

  •    First Responder Procedures-Part3

  •    First Responder Procedures-Part4

  •    First Responder Procedures-Part5

  •    First Responder Procedures-Part6

  •    First Responder Procedures-Part7

  •    First Responder Procedures-Part8

Module 6: Forensics Lab

  •    Forensic Lab-Part1

  •    Forensic Lab-Part2

  •    Forensic Lab-Part3

  •    Forensic Lab-Part4

  •    Forensic Lab-Part5

Module 7: Hard Disks and File Systems

  •    Hard Disks And File Systems-Part1

  •    Hard Disks And File Systems-Part2

  •    Hard Disks And File Systems-Part3

  •    Hard Disks And File Systems-Part4

  •    Hard Disks And File Systems-Part5

  •    Hard Disks And File Systems-Part6

  •    Hard Disks And File Systems-Part7

  •    Hard Disks And File Systems-Part8

  •    Hard Disks And File Systems-Part9

  •    Hard Disks And File Systems-Part10

Module 8: Windows Forensics

  •    Windows Forensics-Part1

  •    Windows Forensics-Part2

  •    Windows Forensics-Part3

  •    Windows Forensics-Part4

  •    Windows Forensics-Part5

  •    Windows Forensics-Part6

  •    Windows Forensics-Part7

  •    Windows Forensics-Part8

  •    Windows Forensics-Part9

  •    Windows Forensics-Part10

Module 9: Data Acquisition and Duplication

  •    Data Acquisition And Duplication-Part1

  •    Data Acquisition And Duplication-Part2

  •    Data Acquisition And Duplication-Part3

  •    Data Acquisition And Duplication-Part4

  •    Data Acquisition And Duplication-Part5

  •    Data Acquisition And Duplication-Part6

  •    Data Acquisition And Duplication-Part7

Module 10: Recovering Deleted Files and Partitions

  •    Recovering Deleted Files And Partitions-Part1

  •    Recovering Deleted Files And Partitions-Part2

Module 11: Using Access Data FTK

  •    Using Access Data FTK And Special Steps-Part1

  •    Using Access Data FTK And Special Steps-Part2

  •    Using Access Data FTK And Special Steps-Part3

  •    Using Access Data FTK And Special Steps-Part4

  •    Using Access Data FTK And Special Steps-Part5

  •    Using Access Data FTK And Special Steps-Part6

  •    Using Access Data FTK And Special Steps-Part7

  •    Using Access Data FTK And Special Steps-Part8

Module 12: Using EnCase

  •    EnCase-Part1

  •    EnCase-Part2

  •    EnCase-Part3

Module 13: Steganography

  •    Stenography-Part1

  •    Stenography-Part2

  •    Stenography-Part3

  •    Stenography-Part4

Module 14: Password Crackers

  •    Passwords-Part1

  •    Passwords-Part2

  •    Passwords-Part3

  •    Passwords-Part4

Module 15: Log Correlation

  •    Log Correlation-Part1

  •    Log Correlation-Part2

  •    Log Correlation-Part3

  •    Log Correlation-Part4

  •    Log Correlation-Part5

  •    Log Correlation-Part6

Module 16: Network Forensics

  •    Network Forensics-Part1

  •    Network Forensics-Part2

  •    Network Forensics-Part3

  •    Network Forensics-Part4

Module 17: Wireless Attacks

  •    Wireless Attacks-Part1

  •    Wireless Attacks-Part2

  •    Wireless Attacks-Part3

Module 18: Web Attacks

  •    Web Attacks-Part1

  •    Web Attacks-Part2

  •    Web Attacks-Part3

  •    Web Attacks-Part4

  •    Web Attacks-Part5

  •    Web Attacks-Part6

  •    Web Attacks-Part7

  •    Web Attacks-Part8

Module 19: Email Crimes

  •    Email Crimes-Part1

  •    Email Crimes-Part2

  •    Email Crimes-Part3

  •    Email Crimes-Part4

Module 20: Mobile Investigation

  •    Mobile Investigation-Part1

  •    Mobile Investigation-Part2

  •    Mobile Investigation-Part3

  •    Mobile Investigation-Part4

  •    Mobile Investigation-Part5

Module 21: Investigative Reports

  •    Investigation Reports-Part1

  •    Investigation Reports-Part2

  •    Investigation Reports-Part3

  •    Investigation Reports-Part4

Module 22: Expert Witness

  •    Expert Witness-Part1

  •    Expert Witness-Part2

  •    Expert Witness-Part3

Add a review
Computer Hacking Forensics Investigator Computer Hacking Forensics Investigator
* Rating is required
Your review
* Review is required
* Name is required
Based on 57 reviews
5 star
4 star
3 star
2 star
1 star
1-5 of 57 reviews
  1. I’ve enjoyed the training so far. Wish it was more focused on Linux like other training, but still good.

  2. So far all is good

  3. I have signed up for a lot of your courses so it will take me time to get through them all but I am so pleased with what I have already started with. THANK YOU!

  4. Great Assistance. Thank you

Your Training Instructor

Dean Bushmiller

Dean Bushmiller

Lead Instructor for Expanding Security

Dean has had fun for the past 20 years learning and teaching everything he can in technology and security. His consulting experience in accounting systems, inventory control, migrations, and patch management has breathed life into his 12 years in the class room. Dean is a courseware developer who specializes in CISSP and security training. He is the lead instructor for Expanding Security and teaches online as his main job. As a non-military person, he is a proud recipient of six mission coins.

Computer Hacking Forensics Investigator



Subscribe To All-Access

Gain access to this training and all our other courses, offering over 2,500 hours of content, with our cost-effective monthly subscription. No obligations. Cancel anytime.

$49.00 $14.99 Monthly

Computer Hacking Forensics Investigator

Computer Hacking Forensics Investigator
Additional Options to Access This Training
This training is also part of our extensive training library containing over 225 courses, 12,000+ videos and over 19,000 practice test questions.

Monthly All-Access Subscription
7 Days Free - $39.00 / month

A great option at an affordable monthly price.

Annual All-Access Subscription
$229 / year

A discounted price when paying for your All Access library on an annual basis.

Lifetime All-Access Library
$379 One time payment

Exceptional Value. Pay once, never have to buy IT training again.

Related Courses


Enhance your career with Cisco Voice 640-461 training course. Learn from experts at ITU Online and get prepared for CCNA Voice certification.

This Cisco Voice 640-461 course covers the Cisco Certified Network Associate Voice (CCNA Voice) attests to the fact that the IT professional has requisite associate-level knowledge and skills needed to manage a voice network.


Become a Cisco IP Routing expert with ITU Online’s 300-101 course. Learn routing protocols and techniques to enhance your networking skills.

The Cisco IP Routing 300-101 certification exam is a qualifying test for the Cisco CCNP Routing and Switching and CCDP certifications. This examination tests a candidate’s knowledge of routing subjects, advanced security, protocol operations, and knowledge of network design.


Boost your career in wireless networking with Cisco 200-355: Wireless Network Fundamentals course. Enroll now and get certified with ITU Online.

This Cisco 200-355 training IT course will enable students to set up and troubleshoot Small Medium Business and Enterprise wireless networks.