{"id":479,"date":"2022-07-29T11:30:26","date_gmt":"2022-07-29T11:30:26","guid":{"rendered":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/product\/forensic-investigator-in-computer-hacking\/"},"modified":"2023-09-06T07:02:14","modified_gmt":"2023-09-06T07:02:14","slug":"forensic-investigator-in-computer-hacking","status":"publish","type":"product","link":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/product\/forensic-investigator-in-computer-hacking\/","title":{"rendered":"Computer Hacking Forensic Investigator (CHFI)"},"content":{"rendered":"<h3>Overview<\/h3>\n<p>Gain knowledge in the specific security discipline of computer forensics from a vendor-neutral perspective. This course will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure. The \u201cEthical Hacking\u201d and \u201cForensic Investigator in Computer Hacking\u201d course(s) \u00a0are unofficial programs that have been developed by CSI independently of EC-Council. EC-Council has not been endorsed, sponsored or certified this material at any time whatsoever. Usage of these material\/books does not provide any guarantee of passing the EC-Council exam.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>| Total Course Video Hours:<\/strong> 18 Hrs 26 Min<br \/>\n<strong>|\u00a0 Videos:<\/strong> 133<br \/>\n<strong>|\u00a0 Course Access:<\/strong> 12 Months Unlimited Access<br \/>\n<strong>|\u00a0 Study Method:<\/strong> Online Video Lessons<br \/>\n<strong>|\u00a0 Course Type:<\/strong>\u00a0Certificate Course<br \/>\n<strong>|\u00a0 Award:<\/strong> Cyber Studies Institute<\/p>\n","protected":false},"featured_media":262,"comment_status":"open","ping_status":"closed","template":"","meta":[],"product_brand":[],"product_cat":[18,41,19],"product_tag":[],"class_list":{"0":"post-479","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-cybersecurity","7":"product_cat-it-developing-networking","8":"product_cat-networking-software","10":"first","11":"instock","12":"sale","13":"virtual","14":"purchasable","15":"product-type-simple","16":"customify-col"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/product\/479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/comments?post=479"}],"version-history":[{"count":3,"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/product\/479\/revisions"}],"predecessor-version":[{"id":2714,"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/product\/479\/revisions\/2714"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/media\/262"}],"wp:attachment":[{"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/media?parent=479"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/product_brand?post=479"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/product_cat?post=479"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/product_tag?post=479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}