COURSE OVERVIEW
The Certified Digital Forensics Examiner vendor neutral certification is designed to train Cyber Crime and Fraud Investigators whereby students are taught electronic discovery and advanced investigation techniques. This course is essential to anyone encountering digital evidence while conducting an investigation.
Mile2’s Certified Digital Forensics Examiner training teaches the methodology for conducting a computer forensic examination. Students will learn to use forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-custody, and write a findings report.
The Certified Digital Forensics Examiner course will benefit organizations, individuals, government offices, and law enforcement agencies interested in pursuing litigation, proof of guilt, or corrective action based on digital evidence.
UPON COMPLETION
Upon completion, Certified Digital Forensics Examiner students will be able to establish industry acceptable digital forensics standards with current best practices and policies. Students will also be prepared to competently take the C)DFE exam.
Duration: 5 days
Class Format Options:
Live Online Training
Prerequisites:
• A minimum of 1 year in computers
Student Materials:
• Student Workbook
• Student Lab guide
• Exam Prep guide
Certification Exams:
• Mile2 C)DFE – Certified Digital Forensics Examiner
CPEs: 40 Hours
WHO SHOULD ATTEND?
• Security Officers
• IS Managers
• Agents/Police Officers
• Attorneys
• Data Owners
• IT managers
• IS Manager/Officers
EXAM INFORMATION
The Certified Digital Forensics Examiner exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple-choice questions. The exam must be purchased separetely.
COURSE CONTENT
Module 0: Introduction
Module 1: Computer Forensic Incidents
Module 2: Incident Handling
Module 3: Computer Forensic Investigative Theory
Module 4: Computer Forensic Investigative Process
Module 5: Digital Acquisition
Module 6: Disks and Storages
Module 7: Forensic Evidence Protocols
Module 8: Digital Evidence Protocols
Module 9: Digital Evidence Presentation
Module 10: Computer Forensic Laboratory Protocols
Module 11: Computer Forensic Processing Techniques
Module 12: Specialized Artifact Recovery
Module 13: e-Discovery and ESI
Module 14: Mobile Forensics
Module 15: Digital Forensics Reporting
LAB OUTLINE
Scenario
Lab 1 – Chain of Custody
Lab 2 – Identify Seized Evidences
Lab 3 – Devices Acquisition
Lab 4 – Prepare the Case Evidence
Lab 5 – Investigate the Acquired Evidence
Lab 6 – Prepare the Case Evidence
Lab 7 – Finding Clues
Lab 8 – Construct the Case events
Lab 9 – Tie evidence found to the seized Android device
Lab 10 – Incident Response