Certified Virtualization Forensics Examiner – C)VFE

Identifying direct evidence of a crime

Attributing evidence to specific suspects

Determining (or negating) Identifying sources

Determining (or negating) Identifying sources

Confirming (or negating) suspect statements

Confirming (or negating) suspect alibis

Request more information

We'll connect you at the earliest
Certified Virtualization Forensics Examiner – C)VFE
Certified Virtualization Forensics Examiner – C)VFE

Tools Covered in this Course

Course Details

Prerequisites

A student needs to meet the following prerequisites in order to fully benefit from the course:

  • Must have a Digital or Computer Forensics Certification or equivalent knowledge

Course outcome

Participants will be able to apply forensically-sound best practice techniques against virtual infrastructure entities in the following use case scenarios:

  • Identifying direct evidence of a crime
  • Attributing evidence to specific suspects
  • Confirming (or negating) suspect alibis
  • Confirming (or negating) suspect statements
  • Determining (or negating) suspect intent
  • Determining (or negating) Identifying sources
  • Determining (or negating) Authenticating documents

Who should attend

This course was designed for the benefit of the following organization roles:

  • Virtual infrastructure specialists (Architects, Engineers, Administrators)
  • Forensic investigators

Contents

  • Online Video
  • Electronic Book(Workbook/Lab guide)
  • Exam Prep Questions
  • Exam

Course outline

  • Module 1: Digital Forensics –the what, where, when, how, and why
  • Module 2: Virtual Infrastructure
  • Module 3: Forensic Investigation Process
  • Module 4: VI Forensics Scenario 1: Identifying direct evidence of a crime
  • Module 5: VI Forensics Scenario 2: Attributing Evidence to Specific Requests
  • Module 6: VI Forensics Scenario 3: Confirming (or negating) suspect alibis
  • Module 7: VI Forensics Scenario 4: Confirming (or negating) suspect statements
  • Module 8: VI Forensics Scenario 5: Determining (or negating) suspect intent
  • Module 9: VI Forensics Scenario 6: Identifying sources
  • Module 10: VI Forensics Scenario 7: Authenticating documents
  • Module 11: Putting it all together –Course Summary

 Accreditations & Acknowledgements

Mile2 is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS’s Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)

FAQ