{"id":79966,"date":"2023-08-18T11:41:16","date_gmt":"2023-08-18T11:41:16","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=79966"},"modified":"2026-04-15T04:55:26","modified_gmt":"2026-04-15T04:55:26","slug":"ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\/","title":{"rendered":"EC-Council&#8217;s Computer Hacking Forensic Investigator (CHFI) Formally Recognized as a Key Cyber Crime and Forensic Analyst Qualification Under the United States Department Of Defense Directive 8140 Critical to National Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"79966\" class=\"elementor elementor-79966\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8c5c234 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8c5c234\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ad9ed11\" data-id=\"ad9ed11\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cb00dbd elementor-widget elementor-widget-text-editor\" data-id=\"cb00dbd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Investigating intrusions, validating cyber defense systems and postmortem attack investigations, and investigating cybercrime have all become key elements of the United States Cyber Strategy. With the latest 8140M release, the DoD has recognized <a href=\"https:\/\/www.eccouncil.org\/train-certify\/computer-hacking-forensic-investigator-chfi\/\">EC-Council&#8217;s Computer Hacking Forensic Investigator<\/a> CHFI Program as providing intermediate level qualifications for three critical DFIR related roles.<\/p><h2>28 DCWF Job Roles that Recognize EC-Council Certifications.<\/h2><div class=\"table-responsive\"><table class=\"table1\"><thead><tr><th>EC-Council Certification<\/th><th>DoD 8140 Approved Work Roles<\/th><\/tr><\/thead><tbody><tr><td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\" rel=\"noopener\">Certified Ethical Hacker (CEH)<\/a><\/td><td><ul style=\"list-style-type: none;\"><li>111 &#8211; All-Source Analyst<\/li><li>141 &#8211; Warning Analyst<\/li><li>511 &#8211; Cyber Defense Analyst<\/li><li>531 &#8211; Cyber Defense Incident Responder<\/li><li>541 &#8211; Vulnerability Assessment Analyst<\/li><li>661 &#8211; Research &amp; Development Specialist<\/li><\/ul><\/td><\/tr><tr><td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/ceh-master\/\" target=\"_blank\" rel=\"noopener\">CERTIFIED ETHICAL HACKER PRACTICAL (CEH PRACTICAL)<\/a><\/td><td><ul style=\"list-style-type: none;\"><li>111 &#8211; All-Source Analyst<\/li><li>141 &#8211; Warning Analyst<\/li><li>511 &#8211; Cyber Defense Analyst<\/li><li>531 &#8211; Cyber Defense Incident Responder<\/li><li>541 &#8211; Vulnerability Assessment Analyst<\/li><li>661 &#8211; Research &amp; Development Specialist<\/li><\/ul><\/td><\/tr><tr><td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\" target=\"_blank\" rel=\"noopener\">CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO)<\/a><\/td><td><ul style=\"list-style-type: none;\"><li>611 &#8211; Authorizing Official\/Designating Representative<\/li><li>722 &#8211; Information Systems Security Manager<\/li><li>723 &#8211; COMSEC Manager<\/li><li>731 &#8211; Cyber Legal Advisor<\/li><li>801 &#8211; Program Manager<\/li><li>802 &#8211; IT Project Manager<\/li><li>803 &#8211; Product Support Manager<\/li><li>804 &#8211; IT Investment\/Portfolio Manager<\/li><li>805 &#8211; IT Program Auditor<\/li><\/ul><\/td><\/tr><tr><td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/computer-hacking-forensic-investigator-chfi\/\" target=\"_blank\" rel=\"noopener\">COMPUTER HACKING FORENSIC INVESTIGATOR (CHFI)<\/a><\/td><td><ul style=\"list-style-type: none;\"><li>211 &#8211; Forensics Analyst<\/li><li>212 &#8211; Cyber Defense Forensics Analyst<\/li><li>221 &#8211; Cyber Crime Investigator<\/li><\/ul><\/td><\/tr><tr><td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-network-security-course\/\" target=\"_blank\" rel=\"noopener\">CERTIFIED NETWORK DEFENDER (CND)<\/a><\/td><td><ul style=\"list-style-type: none;\"><li>511 &#8211; Cyber Defense Analyst<\/li><li>521 &#8211; Cyber Defense Infrastructure Support Specialist<\/li><li>531 &#8211; Cyber Defense Incident Responder<\/li><\/ul><\/td><\/tr><tr><td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/ec-council-certified-incident-handler-ecih\" target=\"_blank\" rel=\"noopener\">EC-COUNCIL CERTIFIED INCIDENT HANDLER (ECIH)<\/a><\/td><td><ul style=\"list-style-type: none;\"><li>531 &#8211; Cyber Defense Incident Responder<\/li><\/ul><\/td><\/tr><\/tbody><\/table><\/div><h2>What are DoD 8140 and DoDM 8140?<\/h2><p>DoDD 8140, Department of Defense Directive 8140, in combination with DoDM 8140 and DoDI 8140, collectively form a set of guidelines that steer the classification and qualification requirements for individuals engaged in cyber security roles within the United States Department of Defense.<\/p><p>Together, these three documents serve the following purposes:<\/p><ul><li>Establish a DoD-wide mandate for the required qualification of members working in the DoD cyberspace workforce<\/li><li>Identify members of the DoD cyberspace workforce based on their assigned work roles<\/li><li>Implement policies, assign job role-based responsibilities, and prescribe procedures for the qualification of personnel in the DoD Cyberspace Workforce<\/li><\/ul><p>Since 2007, EC-Council has played a significant role by offering multiple approved certifications that impact the training and certification of DoD members worldwide, aiding in the qualification and capability development of US military forces and DoD components.<\/p><h2>What is the DoD Cyberspace Workforce Framework (DCWF)?<\/h2><p>The DoD Cyberspace Workforce Framework (DCWF) introduces a structured taxonomy for cyberspace work roles, defining associated responsibilities through requirements for tasks, knowledge, and skills. When combined with 8140, the DCWF establishes specific work role requirements and qualification criteria for members of the DoD Cyber Workforce.<\/p><h3>CHFI: <a href=\"https:\/\/www.eccouncil.org\/train-certify\/computer-hacking-forensic-investigator-chfi\/\" target=\"_blank\" rel=\"noopener\">Computer Hacking Forensic Investigator<\/a><\/h3><p>About the CHFI Program: EC-Council\u2019s CHFI program is a lab-based program that equips cyber security professionals with knowledge and skills to help their organizations reach a state of forensic readiness. This intense 5-day program immerses students in learning ground-breaking digital forensics technologies and trains them through 50+ forensic labs to give them hands-on experience. Students get trained in establishing the forensics processes, lab, and evidence handling procedures, as well as the various forensic investigation procedures.<\/p><h3>CHFI Course Outline<\/h3><div class=\"table-responsive\"><table class=\"table1\"><tbody><tr><td>Computer Forensics in Today\u2019s World<\/td><td>Computer Forensics Investigation Process<\/td><td>Understanding Hard Disks and File Systems<\/td><td>Data Acquisition and Duplication<\/td><\/tr><tr><td>Defeating Anti-Forensics Techniques<\/td><td>Windows Forensics<\/td><td>Linux and Mac Forensics<\/td><td>Network Forensics<\/td><\/tr><tr><td>Investigating Web Attacks<\/td><td>Dark Web Forensics<\/td><td>Database Forensics<\/td><td>Cloud Forensics<\/td><\/tr><tr><td>Investigating Email Crimes<\/td><td>Malware Forensics<\/td><td>Mobile Forensics<\/td><td>IoT Forensics<\/td><\/tr><\/tbody><\/table><\/div><h3>Key Benefits and Features of CHFI<\/h3><p><strong> 1. Detailed Methodological Learning Approach<\/strong><\/p><p>The CHFI presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence.<\/p><ol><li><strong>Dark Web\u202f&amp; IoT\u202fForensics<\/strong><br \/>The first certification program to offer you\u202f<a href=\"https:\/\/www.eccu.edu\/blog\/technology\/the-dark-web-and-its-dangers\/\">Dark Web<\/a> and <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/understanding-meaning-purpose-iot-forensics\/\" target=\"_blank\" rel=\"noopener\">IoT Forensics<\/a> modules.<\/li><li><strong>Extensive Coverage on Malware Forensics <\/strong>Forensic Methodologies for Cloud Infrastructure (Amazon Web Services, Microsoft Azure Cloud, and Google Cloud Platform)<\/li><li>In-depth focus on <strong>volatile and non-volatile data acquisition<\/strong> and the examination process (RAM Forensics, Tor Forensics, etc.<\/li><li>New techniques such as the <strong>Defeating Anti-Forensic Technique, Windows ShellBags<\/strong> including analyzing LNK files, and Jump Lists<\/li><li><strong>70+ GB<\/strong> of Crafted Evidence Files<\/li><li><strong>68\u202fComplex Labs<\/strong><\/li><li><strong>Latest Forensics tools<\/strong><\/li><li><strong>ANSI 17024<\/strong> Accredited Certification Program<\/li><li>Mapped to the <strong>NICE 2.0<\/strong> Framework<\/li><li>Recognized by the DoD under Directive 8140<\/li><\/ol><p><strong><br \/>CHFI Training and Examination Information to Get Certified.<\/strong><br \/>Please visit the CHFI training page, complete the form, and speak with a career advisor to receive guidance regarding the certification process and any other queries regarding the course.<\/p><p><strong>Training Options<\/strong><br \/>Training Options: iLearn (Self-Study) \/ iWeek (Live Online) \/ Master Class \/ Training Partner (in person)<\/p><p><strong>Examination Format<\/strong><br \/>Number of Questions: 150<br \/>Test Duration: 4 Hours<br \/>Test Format: Multiple Choice<br \/>For more information, visit <a href=\"https:\/\/www.eccouncil.org\/train-certify\/computer-hacking-forensic-investigator-chfi\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.eccouncil.org\/train-certify\/computer-hacking-forensic-investigator-CHFI\/<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-80562fc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"80562fc\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d4b0b3d\" data-id=\"d4b0b3d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f0df314 elementor-widget elementor-widget-heading\" data-id=\"f0df314\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FAQs <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-504482e elementor-widget elementor-widget-text-editor\" data-id=\"504482e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>DoDD 8140 Job Roles Mapped with Computer Hacking Forensic Investigator (CHFI)<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fbb3d8b elementor-widget elementor-widget-accordion\" data-id=\"fbb3d8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2631\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-2631\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is a Forensic Analyst? <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2631\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-2631\"><p>A forensic analyst collects and analyzes physical\/trace evidence from crime scenes to help in investigations. The average salary of a forensic analyst in the United States is $115,175 per year. (Salary.com, 2023).<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2632\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-2632\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">   What is a Cyber Defense Forensics Analyst?  <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2632\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-2632\"><p>A cyber defense forensic analyst is responsible for collecting and analyzing digital evidence and helps in uncovering crucial information to aid in cyber crime investigation. The average salary in the US for a cyber forensics analyst is $84,229. (Salary.com, 2023).<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2633\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-2633\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is a Cyber Crime Investigator? <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2633\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-2633\"><p>A cyber crime investigator investigates cyber crime incidents and gathers information to prosecute malicious actors in court. The average salary for a cyber crime investigator in the United States is $49,252 annually (Salary.com, 2023).<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ce37b6 elementor-widget elementor-widget-heading\" data-id=\"1ce37b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">References <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52412d6 elementor-widget elementor-widget-text-editor\" data-id=\"52412d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Forensic Analyst. (2023, July 25). How Much Does a Forensics Analyst Make? <em>https:\/\/www.salary.com\/research\/salary\/position\/forensics-analyst-salary <\/em><\/p>\n<p>Salary.com. (2023, July 25). Cyber Forensics Analyst Salary in the United States. <em>https:\/\/www.salary.com\/research\/salary\/posting\/cyber-forensics-analyst-salary<\/em> <\/p>\n<p>Salary.com. (2023, July 25). Cyber Crime Investigator Salary in the United States. <em>https:\/\/www.salary.com\/research\/salary\/hiring\/cyber-crime-investigator-salary<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Investigating intrusions, validating cyber defense systems and postmortem attack investigations, and investigating cybercrime have all become key elements of the United States Cyber Strategy. With the latest 8140M release, the DoD has recognized EC-Council&#8217;s Computer Hacking Forensic Investigator C|HFI Program as providing intermediate level qualifications for three critical DFIR related roles. <\/p>\n","protected":false},"author":33,"featured_media":80045,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[29],"tags":[],"class_list":{"0":"post-79966","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-computer-forensics"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>CHFI Recognized Under DoD 8140 for Cyber Forensics | EC-Council<\/title>\n<meta name=\"description\" content=\"Explore EC-Council&#039;s Computer Hacking Forensic Investigator (C|HFI), now officially recognized as a vital qualification for cyber crime and forensic analysts under the United States DoD Directive 8140 (DoD 8140). Delve into the details in our illuminating blog.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CHFI Recognized Under DoD 8140 for Cyber Forensics | EC-Council\" \/>\n<meta property=\"og:description\" content=\"Explore EC-Council&#039;s Computer Hacking Forensic Investigator (C|HFI), now officially recognized as a vital qualification for cyber crime and forensic analysts under the United States DoD Directive 8140 (DoD 8140). Delve into the details in our illuminating blog.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-18T11:41:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-15T04:55:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/CHFI-ec-council-chfi-formally-recognized-key-cyber-crime-feature.png\" \/>\n\t<meta property=\"og:image:width\" content=\"521\" \/>\n\t<meta property=\"og:image:height\" content=\"521\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"CHFI Recognized Under DoD 8140 for Cyber Forensics | EC-Council\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/computer-forensics\\\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/computer-forensics\\\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\"},\"headline\":\"EC-Council&#8217;s Computer Hacking Forensic Investigator (CHFI) Formally Recognized as a Key Cyber Crime and Forensic Analyst Qualification Under the United States Department Of Defense Directive 8140 Critical to National Security\",\"datePublished\":\"2023-08-18T11:41:16+00:00\",\"dateModified\":\"2026-04-15T04:55:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/computer-forensics\\\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\\\/\"},\"wordCount\":953,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/computer-forensics\\\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/US-DoD-Recognizes-CND-for-10-Major-Job-Billets-across-the-Defense-Cyber-Workforce-featured.jpg\",\"articleSection\":[\"Computer Forensics\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/computer-forensics\\\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/computer-forensics\\\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\\\/\",\"name\":\"CHFI Recognized Under DoD 8140 for Cyber Forensics | EC-Council\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/computer-forensics\\\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/computer-forensics\\\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/US-DoD-Recognizes-CND-for-10-Major-Job-Billets-across-the-Defense-Cyber-Workforce-featured.jpg\",\"datePublished\":\"2023-08-18T11:41:16+00:00\",\"dateModified\":\"2026-04-15T04:55:26+00:00\",\"description\":\"Explore EC-Council's Computer Hacking Forensic Investigator (C|HFI), now officially recognized as a vital qualification for cyber crime and forensic analysts under the United States DoD Directive 8140 (DoD 8140). Delve into the details in our illuminating blog.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/computer-forensics\\\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/computer-forensics\\\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/computer-forensics\\\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/US-DoD-Recognizes-CND-for-10-Major-Job-Billets-across-the-Defense-Cyber-Workforce-featured.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/US-DoD-Recognizes-CND-for-10-Major-Job-Billets-across-the-Defense-Cyber-Workforce-featured.jpg\",\"width\":521,\"height\":521,\"caption\":\"US DoD Recognizes CND for 10 Major Job Billets across the Defense Cyber Workforce (DCWF)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/computer-forensics\\\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Computer Forensics\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/computer-forensics\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"EC-Council&#8217;s Computer Hacking Forensic Investigator (CHFI) Formally Recognized as a Key Cyber Crime and Forensic Analyst Qualification Under the United States Department Of Defense Directive 8140 Critical to National Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CHFI Recognized Under DoD 8140 for Cyber Forensics | EC-Council","description":"Explore EC-Council's Computer Hacking Forensic Investigator (C|HFI), now officially recognized as a vital qualification for cyber crime and forensic analysts under the United States DoD Directive 8140 (DoD 8140). Delve into the details in our illuminating blog.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\/","og_locale":"en_US","og_type":"article","og_title":"CHFI Recognized Under DoD 8140 for Cyber Forensics | EC-Council","og_description":"Explore EC-Council's Computer Hacking Forensic Investigator (C|HFI), now officially recognized as a vital qualification for cyber crime and forensic analysts under the United States DoD Directive 8140 (DoD 8140). Delve into the details in our illuminating blog.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-08-18T11:41:16+00:00","article_modified_time":"2026-04-15T04:55:26+00:00","og_image":[{"width":521,"height":521,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/CHFI-ec-council-chfi-formally-recognized-key-cyber-crime-feature.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_title":"CHFI Recognized Under DoD 8140 for Cyber Forensics | EC-Council","twitter_misc":{"Written by":"EC-Council","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd"},"headline":"EC-Council&#8217;s Computer Hacking Forensic Investigator (CHFI) Formally Recognized as a Key Cyber Crime and Forensic Analyst Qualification Under the United States Department Of Defense Directive 8140 Critical to National Security","datePublished":"2023-08-18T11:41:16+00:00","dateModified":"2026-04-15T04:55:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\/"},"wordCount":953,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/US-DoD-Recognizes-CND-for-10-Major-Job-Billets-across-the-Defense-Cyber-Workforce-featured.jpg","articleSection":["Computer Forensics"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\/","name":"CHFI Recognized Under DoD 8140 for Cyber Forensics | EC-Council","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/US-DoD-Recognizes-CND-for-10-Major-Job-Billets-across-the-Defense-Cyber-Workforce-featured.jpg","datePublished":"2023-08-18T11:41:16+00:00","dateModified":"2026-04-15T04:55:26+00:00","description":"Explore EC-Council's Computer Hacking Forensic Investigator (C|HFI), now officially recognized as a vital qualification for cyber crime and forensic analysts under the United States DoD Directive 8140 (DoD 8140). Delve into the details in our illuminating blog.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/US-DoD-Recognizes-CND-for-10-Major-Job-Billets-across-the-Defense-Cyber-Workforce-featured.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/US-DoD-Recognizes-CND-for-10-Major-Job-Billets-across-the-Defense-Cyber-Workforce-featured.jpg","width":521,"height":521,"caption":"US DoD Recognizes CND for 10 Major Job Billets across the Defense Cyber Workforce (DCWF)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/ec-council-chfi-formally-recognized-key-cyber-crime-and-forensic-analyst-qualification-under-the-united-states-dod-directive-8140\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Computer Forensics","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/computer-forensics\/"},{"@type":"ListItem","position":4,"name":"EC-Council&#8217;s Computer Hacking Forensic Investigator (CHFI) Formally Recognized as a Key Cyber Crime and Forensic Analyst Qualification Under the United States Department Of Defense Directive 8140 Critical to National Security"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/79966","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=79966"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/79966\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/80045"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=79966"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=79966"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=79966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}