Course Content

Module 1: Computer Forensics Today

08:38
1.1 Course Introduction
07:36
1.2 Computer Forensics Today Part 1
08:17
1.3 Computer Forensics Today Part 2
11:07
1.4 Computer Forensics Today Part 3
14:01
1.5 Analyze Photos Lab Part 1
06:32
1.6 Analyze Photos Lab Part 2
10:49
1.7 Analyze Photos Lab Part 3

Module 2: Computer Forensics Investigation Process

11:20
2.1 Computer Forensics Investigation Process Part 1
09:09
2.2 Computer Forensics Investigation Process Part 2

Module 3: Hard Disks & File Systems

05:37
3.1 Hard Disks and File Systems Part 1
05:19
3.2 Hard Disks and File Systems Part 2
04:56
3.3 Hard Disks and File Systems Part 3
04:10
3.4 Hard Disks and File Systems Part 4
04:11
3.5 Hard Disks and File Systems Part 5
04:38
3.6 Hard Disks and File Systems Part 6
06:46
3.7 Recovering Graphics Files Lab Part 1
10:57
3.8 Recovering Graphics Files Lab Part 2
11:33
3.9 Recovering Graphics Files Lab Part 3
24:00:00
3.10 Computer Forensics and Investigations

Module 4: Data Acquisition

06:53
4.1 Data Acquisition Part 1
05:23
4.2 Data Acquisition Part 2
08:42
4.3 Forensics Lab Part 1
07:47
4.4 Forensics Lab Part 2

Module 5: Anti-Forensics Techniques

06:11
5.1 Anti-Forensics Techniques Part 1
07:38
5.2 Anti-Forensics Techniques Part 2

Module 6: Network Forensics

08:21
6.1 Network Forensics

Module 7: Web Attack Investigation

04:02
7.1 Web Attack Investigation Part 1
11:28
7.2 Web Attack Investigation Part 2
07:22
7.3 Web Attack Investigation Part 3

Module 8: Database Forensics

04:44
8.1 Database Forensics

Module 9: Forensics with the Cloud

06:47
9.1 Forensics with the Cloud Part 1
06:20
9.2 Forensics with the Cloud Part 2

Module 10: Malware

05:49
10.1 Malware Part 1 (FI)
03:04
10.2 Malware Part 2 (FI)
08:37
10.3 Malware Part 3 (FI)

Module 11: Email Investigation

06:15
11.1 Email Investigation Part 1
04:11
11.2 Email Investigation Part 2

Module 12: Mobile

04:27
12.1 Mobile Part 1
04:47
12.2 Mobile Part 2
03:08
12.3 Mobile Part 3
03:25
12.4 Mobile Part 4
05:06
12.5 Mobile Part 5

Module 13: Forensic Reporting

08:00
13.1 Forensic Reporting

Module 14: Course Summary

02:38
14.1 Course Summary

Course Description

Welcome to the Computer Hacking and Forensics course!

Progress is a nice word. But change is its motivator. And change has its enemies." - Robert Kennedy

Welcome to Cybrary's computer forensics training course! Industry change is here, traditionally, computer forensics training has been very expensive. Now, at Cybrary, you can train to be a computer forensics professional. Online Computer Hacking Forensics Training


Digital crime is more prevalent than ever, and the attacks are getting highly complex. Security software can't pinpoint it---the eyes and expertise of a trained computer forensics professional is necessary. Our online Computer Hacking and Forensics training course teaches you how to become that professional. Love the idea of digital forensics investigation? That's what computer forensics is all about. You'll learn how to; determine potential online criminal activity at its inception, legally gather evidence, search and investigate wireless attacks. Additional topics include unlocking passwords, the establishment and maintenance of a physical "chain of custody" and recovering lost and deleted data. At the conclusion, you will have been taught the concepts included in the computer forensics industry leading EC-Council CHFI certification exam. What are you waiting for? Get started with our computer forensics training now, below!

Do you want to become a penetration tester? Would you like to become a SOC analyst? This course could take you one more step down your career path toward your goal. Sign up for Cybrary's Career Path program today! CHFI Course Specs

CEU / CPE: 10

Total Clock Hours: 7 hrs, 8 mins

Get a Certificate of Completion

Materials Used

  • VMWare Player (or other Virtual App)
  • Generic Windows OS
  • CEH toolkits
  • Kali OS

    *Other specific tools used in the videos are listed in each video's title. If you enjoy this course, be sure to check out the Ethical Hacking class next, at Cybrary.### What Does the Computer Hacking and Forensics Course Include?

Our online Computer Hacking and Forensics course teaches all the concepts required for you to become a professional in the computer forensics industry. Cybercrime is a growing concern, therefore there is an increasing need for digital forensics investigators, which this course will teach you to be. In this training, you will become proficient in determining potential online criminal activity from its origins, search and gather evidence legally, investigate cyber-attacks, and administrative tasks like unlocking passwords and recovering lost or deleted data. Ultimately, the knowledge you gain in this digital forensics class will help you prepare to complete the EC-Council CHFI certification exam successfully. The course is 7 hrs., 8 min. of clock time, and you will receive a Certificate of Completion upon finishing the training.

Who is the Computer Hacking and Forensics Course Designed for?

This training will benefit anyone working in the IT industry who is involved with information system security, incident response, and computer forensics. The target audience for the Computer Hacking and Forensics course includes: - Military and Defense personnel

  • Law enforcement personnel
  • System administrators
  • Insurance, banking, legal and other professionals
  • Government agencies and organizations
  • IT managers
  • E-Business security professionals

Why Should I Get a Computer Forensics Certification?

The Computer Forensics certification will allow you to become a member of a growing industry. The work can be exciting and include a range of work from identity theft, embezzlement, fraud, hacking activity, and security breaches. If you have an analytical personality, strong communication skills, and are tech-savvy, you will likely enjoy working in the computer forensics field. With a CHFI certification, you will have more opportunities to obtain higher level positions and more opportunities for advancement.

What Does a Digital Forensics Professional Do?

A digital forensics professional can work within several specialties in the information technology field. Besides a computer forensics investigator, other jobs include:

  • Computer Forensics Analyst – This position requires uncovering digital data (like erased files or emails), preserving it for use as evidence, and analysis of the data associated with the suspected crime.
  • Ethical Hacker – These professionals are employed by companies to identify vulnerabilities in their computer network systems in order to resolve them for their organizations.
  • Information Security Manager – This position is typically for experts who have advanced to management level within the digital forensics department.
  • Special Agent – Forensics experts may work for governmental agencies like the Department of Homeland Security, CIA, FBI, or IRS and may specialize in counter-terrorism or counterintelligence as it applies to the online realm.

Depending on the organization and the specific position, digital forensics professionals may be required to assist in the preparation of law enforcement and court-related documents like court orders, subpoenas, and search and seizure warrants. Additionally, they may be required to testify in court cases or provide expert witness testimony in support of forensic investigations.

What Are the Requirements for a Computer Forensics Certification?

The Computer Hacking Forensics Investigator certification exam is provided by the EC-Council and is available at any VUE or Prometric exam centers around the world. To earn the certification, you must complete a 150 multiple choice question test with a score of at least 70 percent. You have four hours to finish the test. Your certification will be valid for three years, and then can be renewed as long as certain guidelines are met. Cybrary offers a free CHFI study guide to aid in your review for the exam. About the EC-Council CHFI Certification Exam


Many people and employers consider the CHFI to be the most prominent computer forensics certification. In order to earn the official CHFI certification, you must take one required exam. Test-takers must score at least 70 percent on the 150-question exam. The exam can be taken globally, at any VUE or Prometric test center. You can review for the exam with our free CHFI study guide. Certifications are valid for three years. Reestablishing your certification status requires certain guidelines be met. For more information on maintaining the CHFI certification, visit EC-Council's website. Do you know someone who could benefit from this online computer forensics training class? Email them an invite and they can join you, and you earn cybytes!

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor

Provided By

Cybrary Logo

Course Components

On Demand Videos to learn from industry leaders
Virtual Labs to gain hands on experience and apply what you learned

Certificate of Completion

Certificate Of Completion

Complete this entire course to earn a Computer Hacking and Forensics Certificate of Completion