Computer Hacking Forensic Investigator – CHFI


This program is a comprehensive course covering important research scenarios, allowing students to gain hands-on experience. The program provides a strong knowledge base of the key concepts and practices in forensic domains relevant to organizations today. Additionally, CHFI provides a firm understanding of digital forensics domains.

Addressed to

  • All IT professionals involved with information security systems, computer forensics, and incident response.


40 hours


  • Face-to-face

  • Virtual live through digital platforms

  • on site

Related Courses

  • Certified Ethical Hacker – CEHv11

  • Certified Network Defender – CND

It includes

  • 40 hours of training

  • certified instructors

  • Participant Handbook

  • Certification Exam

  • Proof of participation


Lesson 1: Computer Forensics in Today’s World

Lesson 2: Computer Forensics Investigation Process

Lesson 3: Understanding File Systems and Hard Drives

Lesson 4: Data Acquisition and Duplication

Lesson 5: Defeat Anti-Forensic Techniques

Lesson 6: Forensic Investigation to the Operating System

Lesson 7: Network Forensics

Lesson 8: Network Attack Investigation

Lesson 9: Database Forensics

Lesson 10: Cloud Forensics

Lesson 11: Malware Forensics

Lesson 12: Email Crime Investigation

Lesson 13: Mobile Device Forensics

Lesson 14: Writing and Submitting Forensic Reports

You want more information about this curse? Contact us!

By sending this message you agree to our Privacy Notice


Renewable Energy

What is it?

We offer specialized services of photovoltaic solar energy that is obtained directly from solar radiation through a solar panel that in turn transforms it into electric power.

Who is it for?

All those companies, businesses and homes that want to reduce costs in their day to day and want to have a sustainability plan to support the environment as well as their economy.

Why us?

1.- Support from a team committed to the environment.
2.- GSB will provide you with the best solution according to your needs
3.- Control and monitoring as well as operation reports, maintenance of preventive and corrective equipment.


What is it?

We offer specialized services in Cyber ​​​​Security in real time with the best tools, alliances and technology for the protection of your information and operation.

Who is it for?

All those companies that use technology on a daily basis and wish to have the guarantee of a team with vast experience, knowledge, kindness, efficiency and speed.

Why us?

1.- We identify your needs and proceed to define the required actions, through the use of analysis tools such as: diagnostic interviews, concept tests, simulators and questionnaires.

2.- We have the best specialists in the market, which allows us to provide you with a service that guarantees your protection against threats.

3.- We implement processes that allow timely feedback, through which we manage to mitigate risks and protect the computer security of your company.