Investigating intrusions, validating cyber defense systems and postmortem attack investigations, and investigating cybercrime have all become key elements of the United States Cyber Strategy. With the latest 8140M release, the DoD has recognized EC-Council’s Computer Hacking Forensic Investigator C|HFI Program as providing intermediate level qualifications for three critical DFIR related roles.
31 DCWF Job Roles that Recognize EC-Council Certifications.
(DCWF Job roles that Recognize C|HFI are highlighted)
Role | Basic | Intermediate | Advanced |
---|---|---|---|
(211) Forensic Analyst | C|HFI | ||
(212) Cyber Defense Forensics Analyst | C|HFI | ||
(221) Cyber Crime Investigator | C|HFI | ||
(411) Technical Support Specialist | C|ND | ||
(422) Data Analyst | C|CISO | ||
(441) Network Operations Specialist | C|ND | C|EH | |
(451) System Administrator | C|ND | ||
(461) Systems Security Analyst | C|ND | ||
(511) Cyber Defense Analyst | C|EH | ||
(521) Cyber Defense Infrastructure Support Specialist | C|ND | C|EH | |
(541) Vulnerability Assessment Analyst | C|EH | ||
(611) Authorizing Official/Designating Representative | C|CISO | ||
(612) Security Control Assessor | C|CISO | ||
(631) Information Systems Security Developer | C|ND | ||
(632) Systems Developer | C|ND | ||
(641) Systems Requirements Planner | C|ND | ||
(651) Enterprise Architect | C|ND | ||
(661) R&D Specialist | C|EH | ||
(671) System Testing & Evaluation Specialist | C|ND | C|EH | |
(722) Information Systems Security Manager | C|CISO | ||
(751) Cyber Workforce Developer and Manager | C|CISO | ||
(752) Cyber Policy and Strategy Planner | C|CISO | ||
(801) Program Manager | C|CISO | ||
(802) IT Project Manager | C|CISO | ||
(803) Product Support Manager | C|CISO | ||
(804) IT Investment/Portfolio Manager | C|CISO | ||
(805) IT Program Auditor | C|CISO | ||
(901) Executive Cyber Leadership | C|CISO |
What are DoD 8140 and DoDM 8140?
DoDD 8140, Department of Defense Directive 8140, in combination with DoDM 8140 and DoDI 8140, collectively form a set of guidelines that steer the classification and qualification requirements for individuals engaged in cyber security roles within the United States Department of Defense.
Together, these three documents serve the following purposes:
- Establish a DoD-wide mandate for the required qualification of members working in the DoD cyberspace workforce
- Identify members of the DoD cyberspace workforce based on their assigned work roles
- Implement policies, assign job role-based responsibilities, and prescribe procedures for the qualification of personnel in the DoD Cyberspace Workforce
Since 2007, EC-Council has played a significant role by offering multiple approved certifications that impact the training and certification of DoD members worldwide, aiding in the qualification and capability development of US military forces and DoD components.
What is the DoD Cyberspace Workforce Framework (DCWF)?
The DoD Cyberspace Workforce Framework (DCWF) introduces a structured taxonomy for cyberspace work roles, defining associated responsibilities through requirements for tasks, knowledge, and skills. When combined with 8140, the DCWF establishes specific work role requirements and qualification criteria for members of the DoD Cyber Workforce.
C|HFI: Computer Hacking Forensic Investigator
About the C|HFI Program: EC-Council’s C|HFI program is a lab-based program that equips cyber security professionals with knowledge and skills to help their organizations reach a state of forensic readiness. This intense 5-day program immerses students in learning ground-breaking digital forensics technologies and trains them through 50+ forensic labs to give them hands-on experience. Students get trained in establishing the forensics processes, lab, and evidence handling procedures, as well as the various forensic investigation procedures.
C|HFI Course Outline
Computer Forensics in Today’s World | Computer Forensics Investigation Process | Understanding Hard Disks and File Systems | Data Acquisition and Duplication |
Defeating Anti-Forensics Techniques | Windows Forensics | Linux and Mac Forensics | Network Forensics |
Investigating Web Attacks | Dark Web Forensics | Database Forensics | Cloud Forensics |
Investigating Email Crimes | Malware Forensics | Mobile Forensics | IoT Forensics |
Key Benefits and Features of C|HFI
1. Detailed Methodological Learning Approach
The C|HFI presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence.
- Dark Web & IoT Forensics
The first certification program to offer you Dark Web and IoT Forensics modules. - Extensive Coverage on Malware Forensics Forensic Methodologies for Cloud Infrastructure (Amazon Web Services, Microsoft Azure Cloud, and Google Cloud Platform)
- In-depth focus on volatile and non-volatile data acquisition and the examination process (RAM Forensics, Tor Forensics, etc.
- New techniques such as the Defeating Anti-Forensic Technique, Windows ShellBags including analyzing LNK files, and Jump Lists
- 50 GB of Crafted Evidence Files
- 50+ Complex Labs
- Latest Forensics tools
- ANSI 17024 Accredited Certification Program
- Mapped to the NICE 2.0 Framework
- Recognized by the DoD under Directive 8140
C|FHI Training and Examination Information to Get Certified.
Please visit the C|FHI training page, complete the form, and speak with a career advisor to receive guidance regarding the certification process and any other queries regarding the course.
Training Options
Training Options: iLearn (Self-Study) / iWeek (Live Online) / Master Class / Training Partner (in person)
Examination Format
Number of Questions: 150
Test Duration: 4 Hours
Test Format: Multiple Choice
For more information, visit https://www.eccouncil.org/train-certify/computer-hacking-forensic-investigator-C|HFI/