CHFI covers detailed methodological approach to computer forensic and evidence analysis. It provides the necessary skillset for identification of intruder’s footprints and gathering necessary evidence for its prosecution. All major tools and theories used by cyber forensic industry are covered in the program. CHFI presents a methodological approach to computer forensic including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence.
Course Outline
Some of these training modules will be covered in the program:
IT/forensics professionals with basic knowledge on IT/cyber security, computer forensics, and incident response
Prior completion of CEH training would be an advantage
Individuals interested in cyber forensics/investigation
IT professionals involved with information system security, computer forensics and incident response.
Strathmore student, staff, alumni – Ksh 50,000
Student from other institutions – Ksh 60,000
Professionals – Ksh 70,000