$950.00 On-Demand Learning

Overview

OVERVIEW

Course Includes:

  • Individual Course Access
  • Course Video
  • E-Workbook
  • E-Prep & Lab Guide
  • Exam
  • 2 Week Cyber Range
  • 1 Year Exam Voucher

Prerequisites:

• A minimum of 1 year in computers

Student Materials:

  • Student Workbook
  • Student Lab Guide
  • Exam Prep Guide

Who Should Attend?

  • Security Officers
  • IS Managers
  • Agents/Police Officers
  • Attorneys
  • Data Owners
  • IT managers
  • IS Manager/Officers

The Certified Digital Forensics Examiner vendor-neutral certification is designed to train Cyber Crime and Fraud Investigators whereby students are taught electronic discovery and advanced investigation techniques. This course is essential to anyone encountering digital evidence while conducting an investigation. Mile2’s Certified Digital Forensics Examiner training teaches the methodology for conducting a computer forensic examination. Students will learn to use forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-custody, and write a findings report. The Certified Digital Forensics Examiner course will benefit organizations, individuals, government offices, and law enforcement agencies interested in pursuing litigation, proof of guilt, or corrective action based on digital evidence.

Upon completion, Certified Digital Forensics Examiner students will be able to establish industry acceptable digital forensics standards with current best practices and policies. Students will also be prepared to competently take the C)DFE exam.

Description

Course Outline

  • Module 1 – Introduction
  • Module 2 – Computer Forensic Incidents
  • Module 3 – Investigation Process
  • Module 4 – Disk Storage Concepts
  • Module 5 – Digital Acquisition & Analysis
  • Module 6 – Forensic Examination Protocols
  • Module 7 – Digital Evidence Protocols
  • Module 8 – CFI Theory& Scanning
  • Module 9 – Digital Evidence Presentation
  • Module 10 – Computer Forensic Laboratory Protocols
  • Module 11 – Computer Forensic Processing Techniques
  • Module 12– Digital Forensics Reporting
  • Module 13 – Specialized Artifact Recovery
  • Module 14– e-Discovery and ESI
  • Module 15– Mobile Device Forensics
  • Module 16– USB Forensics
  • Module 17– Incident Handling& Scanning

Lab Outline

  • Lab 1 – Preparing Forensic Workstation
  • Lab 2 – Chain of Custody
  • Lab 3 – Imaging Case Evidence / FTK Imager
  • Lab 4 – Create a new case for Autopsy
  • Lab 5 – Reviewing Evidence / Autopsy (Case #1)
  • Lab 6 – Reviewing Evidence / Autopsy (Case #2)