HOME >> IT CERTIFICATIONS >> >> Computer Hacking Forensic Investigator (CHFI)

£59.00
Duration: 18 Hours 26 Minutes
133 Course Videos
Computer Hacking Forensic Investigator (CHFI)

CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.

Course Videos

This course contains the following modules and videos. Click the down arrow to view video details.


  • Intro To Course-Part1
  • Intro To Course-Part2
  • Intro To Course-Part3
  • Intro To Course-Part4
  • Intro To Course-Part5
  • Intro To Forensics-Part1
  • Intro To Forensics-Part2
  • Intro To Forensics-Part3
  • Intro To Forensics-Part4
  • Intro To Forensics-Part5
  • Intro To Forensics-Part6
  • Intro To Forensics-Part7
  • Intro To Forensics-Part8
  • Forensics Investigation Process-Part1
  • Forensics Investigation Process-Part2
  • Forensics Investigation Process-Part3
  • Forensics Investigation Process-Part4
  • Forensics Investigation Process-Part5
  • Forensics Investigation Process-Part6
  • Forensics Investigation Process-Part7
  • Forensics Investigation Process-Part8
  • Forensics Investigation Process-Part9
  • Forensics Investigation Process-Part10
  • Searching And Seizing-Part1
  • Searching And Seizing-Part2
  • Searching And Seizing-Part3
  • Searching And Seizing-Part4
  • Searching And Seizing-Part5
  • Digital Evidence-Part1
  • Digital Evidence-Part2
  • Digital Evidence-Part3
  • Digital Evidence-Part4
  • Digital Evidence-Part5
  • Digital Evidence-Part6
  • Digital Evidence-Part7
  • First Responder Procedures-Part1
  • First Responder Procedures-Part2
  • First Responder Procedures-Part3
  • First Responder Procedures-Part4
  • First Responder Procedures-Part5
  • First Responder Procedures-Part6
  • First Responder Procedures-Part7
  • First Responder Procedures-Part8
  • Forensic Lab-Part1
  • Forensic Lab-Part2
  • Forensic Lab-Part3
  • Forensic Lab-Part4
  • Forensic Lab-Part5
  • Hard Disks And File Systems-Part1
  • Hard Disks And File Systems-Part2
  • Hard Disks And File Systems-Part3
  • Hard Disks And File Systems-Part4
  • Hard Disks And File Systems-Part5
  • Hard Disks And File Systems-Part6
  • Hard Disks And File Systems-Part7
  • Hard Disks And File Systems-Part8
  • Hard Disks And File Systems-Part9
  • Hard Disks And File Systems-Part10
  • Windows Forensics-Part1
  • Windows Forensics-Part2
  • Windows Forensics-Part3
  • Windows Forensics-Part4
  • Windows Forensics-Part5
  • Windows Forensics-Part6
  • Windows Forensics-Part7
  • Windows Forensics-Part8
  • Windows Forensics-Part9
  • Windows Forensics-Part10
  • Data Acquisition And Duplication-Part1
  • Data Acquisition And Duplication-Part2
  • Data Acquisition And Duplication-Part3
  • Data Acquisition And Duplication-Part4
  • Data Acquisition And Duplication-Part5
  • Data Acquisition And Duplication-Part6
  • Data Acquisition And Duplication-Part7
  • Recovering Deleted Files And Partitions-Part1
  • Recovering Deleted Files And Partitions-Part2
  • Using Access Data FTK And Special Steps-Part1
  • Using Access Data FTK And Special Steps-Part2
  • Using Access Data FTK And Special Steps-Part3
  • Using Access Data FTK And Special Steps-Part4
  • Using Access Data FTK And Special Steps-Part5
  • Using Access Data FTK And Special Steps-Part6
  • Using Access Data FTK And Special Steps-Part7
  • Using Access Data FTK And Special Steps-Part8
  • EnCase-Part1
  • EnCase-Part2
  • EnCase-Part3
  • Stenography-Part1
  • Stenography-Part2
  • Stenography-Part3
  • Stenography-Part4
  • Passwords-Part1
  • Passwords-Part2
  • Passwords-Part3
  • Passwords-Part4
  • Log Correlation-Part1
  • Log Correlation-Part2
  • Log Correlation-Part3
  • Log Correlation-Part4
  • Log Correlation-Part5
  • Log Correlation-Part6
  • Network Forensics-Part1
  • Network Forensics-Part2
  • Network Forensics-Part3
  • Network Forensics-Part4
  • Wireless Attacks-Part1
  • Wireless Attacks-Part2
  • Wireless Attacks-Part3
  • Web Attacks-Part1
  • Web Attacks-Part2
  • Web Attacks-Part3
  • Web Attacks-Part4
  • Web Attacks-Part5
  • Web Attacks-Part6
  • Web Attacks-Part7
  • Web Attacks-Part8
  • Email Crimes-Part1
  • Email Crimes-Part2
  • Email Crimes-Part3
  • Email Crimes-Part4
  • Mobile Investigation-Part1
  • Mobile Investigation-Part2
  • Mobile Investigation-Part3
  • Mobile Investigation-Part4
  • Mobile Investigation-Part5
  • Investigation Reports-Part1
  • Investigation Reports-Part2
  • Investigation Reports-Part3
  • Investigation Reports-Part4
  • Expert Witness-Part1
  • Expert Witness-Part2
  • Expert Witness-Part3
Our Learning System Includes
Instructor Led Lectures
All of our IT Courses recreate a real time class experience with a highly qualified and experienced instructor delivering the course’s theories and concepts on screen. All of our lectures are pre-recorded and available to the user 24/7. They can easily be paused, repeated, rewound and fast-forwarded.
Visual Presentations
We understand that all students are different when it comes to learning, therefore different types of delivery mediums are needed in order to achieve success for students. Taking that into account, we deliver our content in a variety of different ways to ensure that students stay engaged and productive throughout their courses.
Mobile Optimisation & Progress Tracking
Our courses are optimised for all mobile devices allowing users to learn on the go whenever they have spare time and wish to do so. Users can access their courses from anywhere and their progress is completely tracked and recorded delivering peace of mind to each and every user.
Practice Quizzes and Exams
Our custom practice exams prepare students for their exams differently and more effectively than the traditional exam preps on the market. Students will have practice quizzes after each module to ensure that they are confident on the topic they are learning.
World Class Learning Management System
We provide the next generation Learning Management System (LMS) to all of our students. This is an experience that combines the feature set of traditional LMS with advanced functionality designed to make learning management easy and online learning engaging from the student’s perspective.
Copyright © 2024 London College of Online Learning Limited. Registered in the UK: 12747658. | Sitemap
Open chat
1
We are available 24/7
Hello there 👋

Can we help you today?
effingames americafreeview ATM138