Certified Digital Forensics Examiner – C)DFE

Mobile Device Forensics

Forensic Evidence Protocols

Digital Forensics Reporting

Incident Handling

Request more information

We'll connect you at the earliest
Certified Digital Forensics Examiner – C)DFE
Certified Digital Forensics Examiner – C)DFE

Tools Covered in this Course

Course Details

Prerequisites

A student needs to meet the following prerequisites in order to fully benefit from the course:

  • A minimum of 1 year of experience working with computers
  • The course requires the prospective candidates to have a minimum of one year of experience in the field related to digital forensics.
  • A good understanding and hands-on working knowledge of digital devices such as smartphones, tablets, personal computers, and laptops are also required to completely understand the contents of this course.

Course outcome

Upon completion, Certified Digital Forensics Examiner students will be able to establish industry-acceptable digital forensics standards with current best practices and policies.

Who should attend

This course was designed for the benefit of the following organization roles:

  • Security Officers
  • IS Managers
  • Agents/Police Officers
  • Attorneys; Data Owners
  • IT managers
  • IS Manager/Officers.

Contents

  1. C)DFE Online Video
  2. C)DFE Electronic Book (Workbook/Lab guide)
  3. C)DFE Exam Prep Questions
  4. C)DFE Exam
  5. 2 weeks C)DFE Cyber Range Lab access (Request login from Mile2 when it suits you)

What you’ll learn

  • After successfully completing this course, the students shall be able to:
  • Establish industry acceptable digital forensics standards
  • Learn the tools of the trade
  • Comprehensively investigate the incident for digital evidence
  • Discover electronic evidence
  • Understand cellphone, computer, and other digital forensics
  • Pass the CDFE certification exam

Course Outline

  • Module 0 – Introduction
  • Module 1 – Computer Forensic Incidents
  • Module 2 – Incident Handling
  • Module 3 – Computer Forensic Investigative Theory
  • Module 4 – Computer Forensic Investigative Process
  • Module 5 – Digital Acquisition
  • Module 6 – Disks and Storages
  • Module 7 – Forensic Evidence Protocols
  • Module 8 – Digital Evidence Protocols
  • Module 9 – Digital Evidence Presentation
  • Module 10 – Computer Forensic Laboratory Protocols
  • Module 11– Computer Forensic Processing Techniques
  • Module 12 – Specialized Artifact Recovery
  • Module 13– e-Discovery and ESI
  • Module 14– Mobile Device Forensics
  • Module 15– Digital Forensics Reporting

Lab Outline

  • Scenario
  • Lab 1 – Chain of Custody
  • Lab 2 – Identify Seized Evidence
  • Lab 3 – Device Acquisition
  • Lab 4 – Prepare the Case Evidence
  • Lab 5 – Investigate the Acquired Evidence
  • Lab 6 – Prepare the Case Evidence
  • Lab 7 – Finding Clues
  • Lab 8 – Construct the Case Events
  • Lab 9 – Tie Evidence found to the seized Android Device
  • Lab 10 – Incident Response

 Accreditations & Acknowledgements

Mile2 is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS’s Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)

FAQ