CHFI-banner (1)

CHFI covers detailed methodological approach to computer forensic and evidence analysis. It provides the necessary skillset for identification of intruder’s footprints and gathering necessary evidence for its prosecution. All major tools and theories used by cyber forensic industry are covered in the program. CHFI presents a methodological approach to computer forensic including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence.

CHFI (1)

Course Outline

Some of  these  training modules will be covered in the program:

  1. Computer Forensics in today’s world
  2. Computer Forensics in Investigation
  3. Understanding Hard Disks and File Systems
  4. Data Acquisition and Duplication
  5. Defeating Anti- Forensics Techniques
  6. Operating System Forensics
  7. Network Forensics
  8. Investigating Web Attacks
  9. Database Forensics
  10. Cloud Forensics
  11. Malware Forensics
  12. Investigating Email Crimes
  13. Mobile Forensics
  14. Forensics Report Writing and Presentation

Quick Info


IT/forensics professionals with basic knowledge on IT/cyber security, computer forensics, and incident response

Prior completion of CEH training would be an advantage

Target Audience

Individuals interested in cyber forensics/investigation

IT professionals involved with information system security, computer forensics and incident response.


Strathmore student, staff, alumni – Ksh 50,000

Student from other institutions – Ksh 60,000

Professionals – Ksh 70,000