RSS feed logo header graphic

Black Hat USA 2009 4-day Training Session

July 25-28

Computer Hacking Forensic Investigator (CHFI)

EC Council

Register Button


Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information.

Securing and analyzing electronic evidence is a central theme in an ever-increasing number of conflict situations and criminal cases. Electronic evidence is critical in the following situations:

  • Disloyal employees
  • Computer break-ins
  • Possession of pornography
  • Breach of contract
  • Industrial espionage
  • E-mail Fraud
  • Bankruptcy
  • Disputed dismissals
  • Web page defacements
  • Theft of company documents

Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client’s systems, to tracing the originator of defamatory emails, to recovering signs of fraud.

Learning Objectives:

The CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal." It is no longer a matter of "will your organization be comprised (hacked)?" but, rather, "when?" Today's battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cyber-criminal, then this is the course for you.

Who should attend:

Police and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies, IT managers


Chuck Swanson, CEH, CHFI, ECSA, LPT, CEI, MCT, MCTS, MCITP, MSCE:Security, MCSE+I, CTT+, Security+, MCNI, MCNE
Independent Trainer/Consultant

Chuck Swanson has consulted and trained in Italy, Greece, Ireland, Netherlands, Japan, Korea, Hawaii and throughout the United States. He specializes in Systems Management Server, Exchange, ethical hacking, computer forensics, and clustering, providing services to customers such as the Department of Defense (US and other countries) and various nuclear plants on the east coast. He is an author, subject matter expert, and speaker/presenter for Microsoft, Element K and EC-Council. Chuck won a National Cable Ace award as Host of the syndicated computer TV show, “Point-N-Click”, which aired for 9 years on Time Warner Cable. He also appears frequently on local TV and the WFBL radio show, “Technology Geeks”, as a computer expert.

Having been a speaker for EC-Council at various events and conferences around the world, Chuck has been a certified EC-Council instructor since the inception of the CEH program. Hundreds of students around the world have successfully obtained the CEH certification after attending his classes.

Early in his career, he was a PC Technician for many years, Systems Engineer, and then eventually became certified as an MCT and MSCE charter member when both programs started in the 90’s. He is one of only a few trainers in the world who has been continuously certified as a Microsoft Certified Trainer since 1993. Chuck earned a Bachelor’s Degree in Mathematics/Computer Science from Oswego State University

Register Button

Super Early:
Ends Mar 15
Ends May 1

Ends Jul 1

Ends Jul 22







Black Hat Webcasts

Black Hat Social

About Black Hat | Privacy Policy | Sponsorship Inquiry | DEFCON | Black Hat Main RSS Feed