CHFIv11 Version Change Document
CHFIv11 Version Change Document
CHFIv10 CHFIv11
Total Number of Modules 16 15
Total Number of Slides 1265 1210
Total Number of Labs 59 68
Total Number of New Labs 32 18
Total Volume of Evidence
52.4 GB 74 GB
File
Computer Forensics
Standards, eDiscovery,
Wireless Network Forensics,
Google Cloud Forensics,
IoT, Dark Web, AWS and
Social Media Forensics,
New Concepts Added Azure (Cloud), Fileless
Electron Application
Malware, SSD
Analysis, Web Browser
Forensics, Complete Mac
Forensics, Computer
Forensics using Python
Windows 10, Windows Server Windows 11, Windows
OS Used for Labs
2016, Ubuntu (Linux) Server 2022, Ubuntu (Linux)
Course Duration 5 Days (9:00 AM to 5:00 PM) 5 Days (9:00 AM to 5:00 PM)
Exam 150 Questions (MCQ) 150 Questions (MCQ)
Exam Duration 4 Hours 4 Hours
Exam Delivery EC-Council Exam Portal EC-Council Exam Portal
NICE Compliance Final NICE 2.0 Framework Final NICE 2.0 Framework
Module Comparison
CHFIv10 CHFIv11
Module 01: Computer Forensics in Today's Module 01: Computer Forensics in Today's
World World
Module 02: Computer Forensics Module 02: Computer Forensics
Investigation Process Investigation Process
Module 03: Understanding Hard Disks and Module 03: Understanding Hard Disks and
File Systems File Systems
Module 04: Data Acquisition and Duplication Module 04: Data Acquisition and Duplication
Module 05: Defeating Anti-forensics Module 05: Defeating Anti-forensics
Techniques Techniques
Module 06: Windows Forensics Module 06: Windows Forensics
Module 07: Linux and Mac Forensics Module 07: Linux and Mac Forensics
Module 08: Network Forensics Module 08: Network Forensics
Module 09: Investigating Web Attacks Module 09: Malware Forensics
Module 10: Dark Web Forensics Module 10: Investigating Web Attacks
Module 11: Database Forensics Module 11: Dark Web Forensics
Module 12: Cloud Forensics Module 12: Cloud Forensics
Module 13: Email and Social Media
Module 13: Investigating Email Crimes
Forensics
Module 14: Malware Forensics Module 14: Mobile Forensics
Module 15: Mobile Forensics Module 15: IoT Forensics
Module 16: IoT Forensics
CHFIv10 CHFIv11
Module 01: Computer Forensics in Today’s Module 01: Computer Forensics in Today’s
World World
Understand the Fundamentals of Computer Understand the Fundamentals of Computer
Forensics Forensics
▪ Understanding Computer Forensics ▪ Understanding Computer Forensics
▪ Why and When Do You Use Computer
▪ Need for Computer Forensics
Forensics?
▪ Why and When Do You Use Computer
▪ Scope of Computer Forensics
Forensics?
Understand Cybercrimes and their Understand Cybercrimes and their
Investigation Procedures Investigation Procedures
▪ Types of Cybercrimes ▪ Types of Cybercrimes
o Examples of Cybercrimes o Examples of Cybercrimes
▪ Impact of Cybercrimes at the Organizational ▪ Impact of Cybercrimes at the Organizational
Level Level
▪ Cybercrime Investigation ▪ Cyber Attribution
o Civil vs. Criminal Investigation o Cyber Attribution Techniques
o Administrative Investigation o Challenges of Cyber Attribution
Understand Digital Evidence ▪ Cybercrime Investigation
▪ Introduction to Digital Evidence o Civil vs. Criminal Investigation
▪ Types of Digital Evidence o Administrative Investigation
▪ Roles of Digital Evidence Understand Digital Evidence and eDiscovery
▪ Sources of Potential Evidence ▪ Introduction to Digital Evidence
▪ Rules of Evidence ▪ Types of Digital Evidence
▪ Best Evidence Rule ▪ Roles of Digital Evidence
Module 02: Computer Forensics Investigation Module 02: Computer Forensics Investigation
Process Process
Understand the Forensic Investigation Process Understand the Forensic Investigation Process
and its Importance and its Importance
▪ Importance of Computer Forensic
▪ Forensic Investigation Process
Investigation Process
▪ Importance of the Forensic Investigation ▪ Phases Involved in the Computer Forensics
Process Investigation Process
Understand the Pre-investigation Phase Understand First Response
▪ Setting Up a Computer Forensics Lab ▪ First Response
▪ Building the Investigation Team ▪ First Responder
▪ Understanding the Hardware and Software
▪ Roles of First Responder
Requirements of a Forensic Lab
▪ Validating Laboratory Software and Hardware ▪ First Response Basics
▪ Ensuring Quality Assurance ▪ First Response: Different Situations
Understand First Response o First Response by Non-forensic Staff
o First Response by System/Network
▪ First Response Basics
Administrators
o First Response by Laboratory Forensics
▪ First Response by Non-forensics Staff
Staff
▪ First Response by System/Network
▪ First Responder Common Mistakes
Administrators
▪ First Response by Laboratory Forensics Staff ▪ Health and Safety Issues
Understand the Investigation Phase Understand the Pre-investigation Phase
▪ Documenting the Electronic Crime Scene ▪ Setting Up a Computer Forensics Lab
o Documenting the Electronic Crime Scene ▪ Building the Investigation Team
▪ Understanding Hardware and Software
o Photographing and Sketching the Scene
Requirements of a Forensics Lab
▪ Search and Seizure ▪ Validating Laboratory Software and Hardware
o Search and Seizure Process Flow ▪ Ensuring Quality Assurance
▪ Building Security Content, Scripts, Tools, or
o Planning the Search and Seizure
Methods to Enhance Forensic Processes
o Seeking Consent Understand the Investigation Phase
o Obtaining Witness Signatures ▪ Documenting the Electronic Crime Scene
o Obtaining Warrant for Search and Seizure o Photographing and Sketching the Scene
o Example of a Search Warrant ▪ Search and Seizure
o Searches Without a Warrant o Search and Seizure Process Flow
o Collecting Incident Information o Planning Search and Seizure
Module 03: Understanding Hard Disks and File Module 03: Understanding Hard Disks and File
Systems Systems
Describe Different Types of Disk Drives and Describe Different Types of Disk Drives and
their Characteristics their Characteristics
▪ Understanding Hard Disk Drive ▪ Understanding Hard Disk Drive
o Tracks o Tracks
o Sector o Sectors
o 4K Sectors o 4K Sectors
o Data Density on a Hard Disk o Data Density on a Hard Disk
o CHS (Cylinder-Head-Sector) Data o Logical Block Addressing (LBA) and Disk
Addressing and Disk Capacity Calculation Capacity Calculation
o Measuring the Hard Disk Performance o Measuring the Hard Disk Performance
▪ Understanding Solid-State Drive (SSD) ▪ Understanding Solid-State Drive (SSD)
▪ Disk Interfaces ▪ Disk Interfaces
o ATA/PATA (IDE/EIDE) o Serial ATA/SATA (AHCI)
Module 04: Data Acquisition and Duplication Module 04: Data Acquisition and Duplication
Understand Data Acquisition Fundamentals Understand Data Acquisition Fundamentals
▪ Understanding Data Acquisition ▪ Understanding Data Acquisition
▪ Live Acquisition ▪ Live Acquisition
▪ Order of Volatility ▪ Order of Volatility
▪ Dead Acquisition ▪ Dead Acquisition
▪ Rules of Thumb for Data Acquisition ▪ Rules of Thumb for Data Acquisition
▪ Types of Data Acquisition ▪ Types of Data Acquisition
o Logical Acquisition o Logical Acquisition
o Sparse Acquisition o Sparse Acquisition
o Bit-Stream Imaging o Bitstream Image
• Bit-stream disk-to-image file • Bitstream Disk-to-Image File
• Bit-stream disk-to-disk • Bitstream Disk-to-Disk
▪ Determine the Data Acquisition Format ▪ Determine Data Acquisition Format
o Raw Format o Raw Format
o Proprietary Format o Proprietary Format
o Advanced Forensics Format (AFF) o Advanced Forensics Format (AFF)
o Advanced Forensic Framework 4 (AFF4) o Advanced Forensic Framework 4 (AFF4)
Understand Data Acquisition Methodology Understand eDiscovery
▪ Data Acquisition Methodology ▪ eDiscovery
▪ Step 1: Determine the Best Data Acquisition ▪ Electronic Discovery Reference Model (EDRM)
Method Cycle
Module 07: Linux and Mac Forensics Module 07: Linux and Mac Forensics
Understand Volatile and Non-volatile Data in
Collect Volatile Information in Linux
Linux
▪ Introduction to Linux Forensics ▪ Introduction to Linux Forensics
▪ Collecting Volatile Data ▪ Collecting Volatile Information
o Collecting Hostname, Date, and Time o Collecting Hostname, Date, and Time
o Collecting Uptime Data o Collecting Uptime Data
o Collecting Network Information o Collecting Network Information
o Viewing Network Routing Tables o Viewing Network Routing Tables
o Collecting Open Port Information o Collecting Open Port Information
o Finding Programs/Processes Associated o Finding Programs/Processes Associated
with a Port with a Port
o Collecting Data on Open Files o Collecting Open Files
o Collecting Mounted File System o Collecting Mounted File System
Information Information
o Finding Loaded Kernel Modules o Finding Loaded Kernel Modules
o Collecting User Events and Reading ELF o Collecting User Events and Reading ELF
Files Files
o Viewing Running Processes in the System o Viewing Running Processes in the System
o Collecting Swap Areas and Disk Partition
o Viewing Linux Services Using systemctl
Information
o Collecting Swap Areas and Disk Partition
o Collecting Kernel Messages
Information
▪ Collecting Non-volatile Data o Collecting Kernel Messages
o Collecting System Information o Collecting Volatile Information Using Freta
o Collecting Volatile Information Using
o Collecting Kernel Information
Python
o Collecting User Account Information Collect Non-volatile Information in Linux
o Collecting Currently Logged-in Users and
▪ Collecting Non-volatile Information
Login History Information
o Collecting System Logs Data o Collecting System Information
o Linux Log Files o Collecting Kernel Information
o Collecting User History File Information
o Collecting User Account Information
and Viewing Hidden Files and Directories
o Collecting Currently Logged-in Users and
o Collecting Suspicious Information
Login History Information
o File Signature Analysis o Collecting System Logs Data
Module 09: Investigating Web Attacks Module 10: Investigating Web Attacks
Understand Web Application Forensics Understand Web Application Forensics
▪ Introduction to Web Application Forensics ▪ Introduction to Web Application Forensics
▪ Challenges in Web Application Forensics ▪ Challenges in Web Application Forensics
▪ Indications of a Web Attack ▪ Indicators of a Web Attack
▪ OWASP Top 10 Application Security Risks -
▪ Web Application Threats
2021
▪ Web Attack Investigation Methodology ▪ Web Application Threats
Understand Internet Information Services (IIS)
▪ Web Attack Investigation Methodology
Logs
Understand Internet Information Services (IIS)
▪ IIS Web Server Architecture
Logs
▪ IIS Logs ▪ IIS Web Server Architecture
Module 10: Dark Web Forensics Module 11: Dark Web Forensics
Understand the Dark Web and Dark Web
Understand the Dark Web
Forensics
▪ Understanding the Dark Web ▪ Understanding the Dark Web
▪ Tor Relays ▪ Tor Relays
Module 13: Investigating Email Crimes Module 13: Email and Social Media Forensics
Understand Email Basics Understand Email Basics
▪ Introduction to an Email System ▪ Introduction to an Email System
▪ Components Involved in Email ▪ Components Involved in Email
Communication Communication
▪ How Email Communication Works? ▪ How Email Communication Works?
▪ Understanding the Parts of an Email Message ▪ Understanding the Parts of an Email Message
Understand Email Crime Investigation and its Understand Email Crime Investigation and its
Steps Steps
▪ Introduction to Email Crime Investigation ▪ Introduction to Email Crime Investigation
▪ Steps to Investigate Email Crimes ▪ Steps to Investigate Email Crimes
o Step 1: Seizing the Computer and Email o Step 1: Seizing the Computer and Email
Accounts Accounts
o Step 2: Acquiring the Email Data o Step 2: Acquiring the Email Data
• Acquiring Email Data from Desktop- • Acquiring Email Data from Desktop-
based Email Clients based Email Clients
➢ Local Email Files in Microsoft ➢ Local Email Files in Microsoft
Outlook Outlook
➢ Local Email Files in Mozilla ➢ Local Email Files in Mozilla
Thunderbird Thunderbird
➢ Acquiring Thunderbird Local Email ➢ Acquiring Thunderbird Local Email
Files via SysTools MailPro+ Files via SysTools MailPro+
➢ Acquiring Outlook Email Files: .ost to ➢ Acquiring Outlook Email Files: .ost to
.pst File Conversion .pst File Conversion
➢ Acquiring Outlook .pst File via ➢ Acquiring Outlook .pst File via
SysTools MailPro+ SysTools MailPro+
• Acquiring Email Data from Web-based • Acquiring Email Data from Web-based
Email Accounts Email Accounts
o Step 3: Examining Email Messages o Step 3: Examining Email Messages
o Step 4: Retrieving Email Headers o Step 4: Retrieving Email Headers
• Retrieving Email Headers in Microsoft • Retrieving Email Headers in Microsoft
Outlook Outlook
• Retrieving Email Headers in Microsoft • Retrieving Email Headers in Microsoft
Outlook.com outlook.live.com
• Retrieving Email Headers in AOL • Retrieving Email Headers in AOL
• Retrieving Email Headers in Apple Mail • Retrieving Email Headers in Apple Mail
• Retrieving Email Headers in Gmail • Retrieving Email Headers in Gmail
• Retrieving Email Headers in Yahoo Mail • Retrieving Email Headers in Yahoo Mail
Labs Comparison
The notations used:
1. Red points are new labs in CHFIv11
2. Blue points are substantially modified labs in CHFIv11
3. Striked labs are removed from CHFIv10
CHFIv10 CHFIv11
Module 01: Computer Forensics in Today's Module 01: Computer Forensics in Today's
World World
Module 02: Computer Forensics Investigation Module 02: Computer Forensics Investigation
Process Process
1. Recovering Data from a Windows Hard Disk 1. Recover Data from a Windows Hard Disk
2. Performing Hash, or HMAC Calculations 2. Perform Hash or HMAC Calculations
3. Comparing Hash Values of Files for 3. Compare Hash Values of Files for Checking
Checking their Integrity their Integrity
4. Viewing Files of Various Formats 4. View Files of Various Formats
5. Handling Evidence Data 5. Handle Evidence Data
6. Creating a Disk Image File of a Hard Disk 6. Create a Disk Image File of a Hard Disk
Partition Partition
Module 03: Understanding Hard Disks and File Module 03: Understanding Hard Disks and File
Systems Systems
1. Analyzing File System of a Linux Image 1. Analyze File System of a Linux Image
2. Analyzing File System of Windows Images 2. Analyze File System of Windows Images
3. Recovering Deleted Files from Hard Disks 3. Recover Deleted Files from Hard Disks
4. File System Timeline Creation and Analysis
Using The Sleuth Kit (TSK)
5. Analyze Popular File Formats Using Hex
Editor
Module 04: Data Acquisition and Duplication Module 04: Data Acquisition and Duplication
1. Creating a dd Image of a System Drive 1. Create a dd Image of a System Drive
2. Converting Image File from E01 Format to 2. Convert Image File from E01 Format to dd
dd Format Format
3. Mounting Images on a Linux Forensic 3. Mount Images on a Linux Forensic
Workstation Workstation
4. Converting Acquired Image File to a 4. Acquire RAM from Windows and Linux
Bootable Virtual Machine Workstations
5. Acquiring RAM from Windows and Linux 5. Create Customized Images from an Image
Workstations Containing NTFS File System
6. Creating Customized Images from an Image
6. View Contents of Forensic Image File
Containing NTFS File System
7. Viewing Contents of Forensic Image File 7. Access a Disk Image Using PyTSK Tool
4. Discovering and Extracting Forensic Data 4. Capture and Examine Windows Registry
from Computers Files on a Live System
5. Extracting Information about Loaded
5. Examine Web Browser Artifacts
Processes on a Computer
6. Viewing, Monitoring, and Analyzing Events 6. Recover InPrivate Browsing Data and
Occurred on a Windows Machine Browser Artifacts
7. Performing Digital Forensic Investigation on 7. Carve and Analyze the Browser SQLite3
a Computer Database Files
8. Collecting and Parsing Forensic Artifacts on 8. Extract and Rebuild Cached Web Pages of
a Live Windows Machine Google Chrome
9. Discover and Extract Forensic Data from
Computers
10. Extract Information about Loaded
Processes on a Computer
11. View, Monitor, and Analyze Events
Occurred on a Windows Machine
Module 07: Linux and Mac Forensics Module 07: Linux and Mac Forensics
1. Acquiring Volatile Data in Linux System 1. Acquire Volatile Data in a Linux System
2. Investigating Forensic Image of Linux and
2. Acquire Non-Volatile Data in Linux System
Mac
3. Performing Forensic Investigation on a 3. Investigate Forensic Images of Linux and
Linux Memory Dump Mac Systems
4. Recovering Data from a Linux Memory 4. Perform Forensic Investigation on a Linux
Dump Memory Dump
5. Recover Data from a Linux Memory Dump
Module 09: Investigating Web Attacks Module 10: Investigating Web Attacks
1. Identifying and Investigating Web 1. Identify and Investigate Web Application
Application Attacks Using Splunk Attacks Using Splunk
2. Identify and Investigate Web Application
Attacks Using Python
Module 10: Dark Web Forensics Module 11: Dark Web Forensics
1. Detect Tor Browser Activity on Windows
1. Detecting TOR Browser on a Machine
Machine
2. Analyzing RAM dump and Examining TOR 2. Analyze RAM Dumps to Retrieve Tor
Browser Artifacts Browser Artifacts
Module 14: Investigating Email Crimes Module 13: Email and Social Media Forensics
1. Investigating a Suspicious Email 1. Investigate a Suspicious Email
2. Recovering Deleted Email Messages using 2. Recover Deleted Email Messages Using
Recover My Email Recover My Email
3. Recovering Deleted Email Messages Using 3. Recover Deleted Email Messages Using
Paraben’s E3: Universal Recovery Toolbox for Outlook
4. Extract Information from EML Files Using
Python