Skip to content

The Certified Digital Forensics Examiner vendor-neutral certification is designed to train Cyber Crime and Fraud Investigators whereby students are taught electronic discovery and advanced investigation techniques. This course is essential to anyone encountering digital evidence while conducting an investigation. Mile2?s Certified Digital Forensics Examiner training teaches the methodology for conducting a computer forensic examination. Students will learn to use forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-custody, and write a findings report. The Certified Digital Forensics Examiner course will benefit organizations, individuals, government offices, and law enforcement agencies interested in pursuing litigation, proof of guilt, or corrective action based on digital evidence.

Select a date below

Categories:
Topics:

Dates are listed in Pacific Time Zone

= Guaranteed to run date

Description

Print Friendly, PDF & Email

Overview:

The Certified Digital Forensics Examiner vendor-neutral certification is designed to train Cyber Crime and Fraud Investigators whereby students are taught electronic discovery and advanced investigation techniques. This course is essential to anyone encountering digital evidence while conducting an investigation. Mile2’s Certified Digital Forensics Examiner training teaches the methodology for conducting a computer forensic examination. Students will learn to use forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-custody, and write a findings report. The Certified Digital Forensics Examiner course will benefit organizations, individuals, government offices, and law enforcement agencies interested in pursuing litigation, proof of guilt, or corrective action based on digital evidence.

Prerequisite(s):

A minimum of 1 year in computers

Audience:

Security Officers, IS Managers, Agents/Police Officers, Attorneys, Data Owners, IT managers, IS Manager/Officers

Outline:

Lesson 1: Introduction

Lesson 2: Computer Forensic Incidents

Lesson 3: Investigation Process

Lesson 4: Disk Storage Concepts

Lesson 5: Digital Acquisition & Analysis

Lesson 6: Forensic Examination Protocols

Lesson 7: Digital Evidence Protocols

Lesson 8: CFI Theory & Scanning

Lesson 9: Digital Evidence Presentation

Lesson 10: Computer Forensic Laboratory Protocols

Lesson 11: Computer Forensic Processing Techniques

Lesson 12: Digital Forensics Reporting

Lesson 13: Specialized Artifact Recovery

Lesson 14: e-Discovery and ESI

Lesson 15: Mobile Device Forensics

Lesson 16: USB Forensics

Lesson 17: Incident Handling & Scanning

Additional information

Length

5 days

Guaranteed to run

No