Overview
Who Should Attend
Police and other law enforcement personnel
Defense and Security personnel
e-Business Security professionals
Legal professionals
Banking, Insurance, and other professionals
Government agencies
IT managers
Digital Forensics Service Providers
Course Overview
The 5-day course EC-Council Computer Hacking Forensic Investigator (CHFI) is the only comprehensive ANSI accredited, lab-focused program in the market that gives organizations vendor-neutral training in digital forensics.
CHFI provides its attendees with a firm grasp of digital forensics, presenting a detailed and methodological approach to digital forensics and evidence analysis that also pivots around Dark Web, IoT, and Cloud Forensics.
The tools and techniques covered in this program will prepare the learner for conducting digital investigations using ground-breaking digital forensics technologies.
Course Description & Learning Outcomes
Course Objectives
The program is designed for IT professionals involved with information system security, computer forensics, and incident response.
It will help fortify the application knowledge in digital forensics for forensic analysts, cybercrime investigators, cyber defense forensic analysts, incident responders, information technology auditors, malware analysts, security consultants, and chief security officers.
The program equips candidates with the necessary skills to proactively investigate complex security threats, allowing them to investigate, record, and report cybercrimes to prevent future attacks.
Skills that Participants will Gain from this Course:
Gain knowledge of computer forensics in today’s world
Gain a basic understanding and in-depth knowledge of computer forensics investigation process
Understand hard disks and file systems
Understand data acquisition and duplication
Gain knowledge on defeating anti-forensics techniques
Perform Windows, Linux, and Mac forensics
Gain experience and extensive knowledge of network forensics and investigating web attacks
Gain knowledge of administering Dark Web, database, cloud, malware, mobile, and IoT forensics
Investigate email crimes
Course Outline
Module 01: Computer Forensics in Today’s World
Module 02: Computer Forensics Investigation Process
Module 03: Understanding Hard Disks and File Systems
Module 04: Data Acquisition and Duplication
Module 05: Defeating Anti-forensics Techniques
Module 06: Windows Forensics
Module 07: Linux and Mac Forensics
Module 08: Network Forensics
Module 09: Investigating Web Attacks
Module 10: Dark Web Forensics
Module 11: Database Forensics
Module 12: Cloud Forensics
Module 13: Investigating Email Crimes
Module 14: Malware Forensics
Module 15: Mobile Forensics
Module 16: IoT Forensics
Certificate Obtained and Conferred by:
Certificate of Completion from NTUC LearningHub
Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a Certificate of Completion from NTUC LearningHub.
Statement of Attainment (SOA) from SkillsFuture Singapore
Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a SOA from SkillsFuture Singapore to certify that the participant has achieved the following Competency Standard(s):
ICT-OUS-3002-1.1 Cyber Forensics
External Certification
After completing this course and upon passing the official “EC-Council Computer Hacking Forensic Investigator (CHFI)” certification exam, candidates will receive the official certification from EC Council. The certification is governed and maintained by EC Council. For more information: https://cert.eccouncil.org/computer-hacking-forensic-investigator.html
Recommended Prerequisites
Pre-requisites:
Knowledge, Skills & Experience
It is recommended that the participant have at least 1 year of relevant working experience in IT industry with knowledge in the area of Ethical Hacking / network security.
Recommended courses prior to taking CHFI
CompTIA A+
CompTIA Network+
CompTIA Security+
ISACA Cybersecurity Fundamentals
Identity and Access Management Essentials (SF)
EC-Council Certified Network Defender (CND) (SF)
EC-Council Certified Ethical Hacker (CEH) (SF)
Recommended for Career Path Advancement
EC Council Computer Hacking Forensic Investigator (CHFI) (For Incident Response and Forensics)
EC Council Certified Incident Handler (ECIH) (For Incident Response and Forensics)
EC Council Certified SOC Analyst (CSA) (For SOC Operations)
Cisco CCNA Cyber Security Operations (For SOC Operations)
ISC2 Certified Information Systems Security Professional (CISSP) (For Security Engineer)
Certificate of Cloud Auditing Knowledge (CCAK) (For Cloud Security)
ISC2 Certified Cloud Security Professional (CCSP) (For Cloud Security)
Pre-course instructions
Hardware & Software:
This course will be conducted as a Virtual Live Class (VLC) via Zoom platform. Participants must own a zoom account and have a laptop or a desktop with “Zoom Client for Meetings” installed. This can be downloaded from https://zoom.us/download.
Must-have:
Please ensure that your computer or laptop meets the following requirements.
Operating system: Windows 10 or MacOS (64 bit or above)
Processor/CPU: 1.8 GHz, 2-core Intel Core i3 or higher
Minimum 20 GB hard disk space.
Minimum 8 Gb RAM
Webcam (The camera must be turned on for the duration of the class)
Microphone
Internet Connection: Wired or Wireless broadband
Latest version of Zoom software to be installed on computer or laptop prior to the class.
Good-to-have:
Wired internet connection Wired internet will provide you with stable and reliable connection.
Dual monitors Using a dual monitor setup will undoubtedly improve your training experience, enabling you to simultaneously participate in hands-on exercises and maintain engagement with your instructor.
Not recommended:
Using tablets is not recommended due to smaller screen size, which could cause eye strain and discomfort during the program.

Schedule
End Date: 31 Dec 2026, Thursday
Weekdays, Weekends
Location: NTUC Trade Union House, 189556 and OnlinePricing
Course fees: SGD 3500 before GST and subsidies

Skills Covered
PROFICIENCY LEVEL GUIDE
Beginner: Introduce the subject matter without the need to have any prerequisites.
Proficient: Requires learners to have prior knowledge of the subject.
Expert: Involves advanced and more complex understanding of the subject.
- Cybersecurity (Proficiency level: Expert)





