EC-Council β’ CHFI
Validates the ability to detect hacking attacks, extract and preserve digital evidence, and conduct forensic investigations, covering digital forensics methodology, evidence acquisition, chain-of-custody procedures, dark web forensics, IoT forensics, and malware forensics.
Questions
589
Duration
240 minutes
Passing Score
70%
Difficulty
AssociateLast Updated
Feb 2026
The Computer Hacking Forensic Investigator (CHFI) certification, offered by EC-Council under exam code 312-49, validates a practitioner's ability to detect hacking attacks, conduct thorough digital forensic investigations, and extract and preserve evidence in a manner admissible in legal proceedings. The program covers the full forensic investigation lifecycle β from searching and seizing digital assets through chain-of-custody procedures, data acquisition and duplication, defeating anti-forensic techniques, and final reporting. CHFI v11 is the current version of the program and introduced new modules on Dark Web Forensics and IoT Forensics, alongside enhanced coverage of malware forensics (including Emotet and EternalBlue), cloud forensics across AWS, Azure, and GCP, and RAM and Tor forensics.
Accredited under ISO/IEC 17024 (ANAB) and approved under U.S. DoD Directive 8140, CHFI carries formal government recognition as an intermediate-level qualification for three critical DFIR (Digital Forensics and Incident Response) work roles defined by the DoD Cyber Workforce Framework (DCWF). The certification is vendor-neutral in scope but technically deep, with more than 600 forensic tools covered across 68+ hands-on labs, making it one of the most lab-intensive digital forensics programs available.
CHFI is designed for cybersecurity and IT professionals who investigate, respond to, or prosecute cybercrime. Primary job roles include forensic computer analysts, cyber defense forensic analysts, malware analysts, incident responders, information security professionals, and IT auditors. It is also well-suited for law enforcement personnel, military and defense professionals, legal professionals who need to understand digital evidence, and banking or insurance professionals dealing with fraud investigations.
Candidates typically have a background in information technology or cybersecurity and are looking to specialize in digital forensics. The program is appropriate for both practitioners aiming to formalize existing skills and professionals transitioning into a DFIR-focused role. While there is no strict experience prerequisite if attending official training, those applying via the self-study eligibility path should have at least two years of information security experience.
There are no mandatory prerequisites for candidates who enroll in an official EC-Council authorized training program (via Training Partner, iLearn self-study, or iWeek live online). Attending the official CHFI course grants automatic eligibility to sit the exam upon completion.
Candidates who wish to challenge the exam without attending official training must submit an EC-Council Exam Eligibility Application, pay a non-refundable $100 eligibility fee, and demonstrate a minimum of two years of professional experience in the information security field. Practically, EC-Council recommends that candidates possess foundational knowledge of networking concepts, operating systems (Windows, Linux, macOS), cybersecurity fundamentals, and basic incident response procedures before undertaking CHFI study. Prior exposure to ethical hacking concepts (such as through CEH) is beneficial but not required.
The CHFI exam (312-49) consists of 150 multiple-choice questions and must be completed within 240 minutes (4 hours). The exam is delivered through EC-Council's ECC Exam Centers worldwide or via remote proctoring. The exam cost is $650 USD.
To maintain exam integrity, EC-Council administers the test in multiple forms with different question banks. Cut scores are set on a per-form basis, meaning the passing threshold can range from 60% to 85% depending on the specific form delivered. EC-Council publishes a 70% passing score as the benchmark figure. Scores are reported immediately upon completion at test centers. The certification is valid for three years, after which holders must earn 120 EC-Council Education Credits (ECE) to renew.
CHFI-certified professionals qualify for roles including Forensic Computer Analyst, Cyber Defense Forensic Analyst, Malware Analyst, Incident Responder, Cybercrime Investigator, and Information Systems Security Professional. The certification carries particular weight in government and defense sectors: under DoD Directive 8140 (the successor to DoD 8570), CHFI is formally recognized as an intermediate-level qualification for three DFIR-related DCWF work roles, making it a required or preferred credential for cybersecurity positions across U.S. federal agencies and defense contractors. The certification is also valued in finance, healthcare, legal, and insurance sectors where digital evidence and regulatory compliance intersect.
According to PayScale, CHFI-certified professionals earn an average salary of approximately $97,000, with ranges from $72,000 to $118,000 depending on role, location, and experience. Salary.com data places the average forensic analyst salary at $115,175 annually in the U.S. EC-Council reports that CHFI is the only forensics-focused certification program whose holders average a six-figure salary, according to its Salary Survey Report 75. Compared to alternatives such as GCFE (GIAC) or the AccessData ACE, CHFI's broader scope β spanning cloud, IoT, dark web, and mobile forensics β and its DoD recognition give it a stronger positioning for professionals targeting both private-sector and government DFIR roles.
1. During incident response following NIST SP 800-61, a security team identifies a ransomware infection, isolates affected systems, removes the malware, and restores from backups. Which phase should be conducted next? (Select one!)
2. A corporate investigation requires analysis of data exfiltration via cloud storage. The investigator examines Windows artifacts and finds evidence in the following Registry key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs. What type of evidence does this key provide? (Select one!)
3. During SQLite database forensics of a WhatsApp msgstore.db file from an Android device, an investigator wants to recover deleted messages. Which three locations may contain deleted message data? (Select three!)
Select all that apply4. A forensic analyst creates a timeline using Sleuth Kit tools from a disk image. Which command sequence properly generates a body file and converts it to a human-readable MAC time timeline? (Select one!)
5. During a BitLocker encrypted drive investigation, a forensic examiner has access to a live running Windows 10 system with administrative privileges but does not have the BitLocker recovery key. Which two methods can extract the encryption key for offline analysis? (Select two!)
Select all that applyAll exams included β’ Cancel anytime