Maxtrain.com - info@maxtrain.com - 513-322-8888 - 866-595-6863
Certified Digital Forensics Engineer
Description
Certified Digital Forensics Engineer Introduction
Welcome to the Certified Digital Forensics Engineer C)DFE course. In this comprehensive program, you will delve into the world of digital forensics, gaining the necessary skills and knowledge for conducting high-level digital investigations. This course is designed for both professionals already in the field and those aspiring to enter the dynamic and challenging world of digital forensics.
By participating in this course, you will be equipped with advanced techniques and methodologies used in modern digital investigations, preparing you for a rewarding career in this rapidly evolving domain.
As you progress through the course, you will explore various aspects of digital forensics, including data recovery, analysis of digital evidence, and understanding cybercrime. You will learn how to apply forensic principles to various digital devices such as computers, smartphones, and networks, mastering the art of uncovering and preserving digital evidence. This course also emphasizes legal and ethical considerations, ensuring that you are well-versed in the protocols required for presenting evidence in legal contexts.
Through practical exercises and case studies, you will develop critical thinking and problem-solving skills, essential for navigating complex digital investigations.
By the end of this course, you will have a robust foundation in digital forensics, making you a valuable asset in various sectors such as law enforcement, corporate security, and cybersecurity.
Certified Digital Forensics Engineer C)DFE Course Objectives
In this course, you will:
- Gain expertise in digital forensic examinations.
- Learn to report findings from digital investigations accurately.
- Prepare for the C)DFE Exam and earn a valuable certification.
- Explore various aspects of digital forensics, including computer forensics, eDiscovery, cell phone forensics, and incident handling.
- Understand the legal aspects and protocols of handling digital evidence.
Prerequisites
- C)SS: Security Sentinel
- C)ISSO: Information Systems Security Officer
- Or equivalent experience
Audience
- The C)DFE course is a digital forensics course teaches people how to perform digital investigations. In order to do this effectively we require students to have a basic proficiency with using computers and an interest in digital forensics.
- After you complete the C)DFE we encourage you to further develop your digital forensics skill set by taking the C)NFE: Network Forensics Examineer course and certification exam.
Certified Digital Forensics Engineer C)DFE Outline
Introduction
- Lesson Objectives
- Introductions (Instructor)
- Introductions (Students)
- Disclaimers
- Notice
- Course Schedule
- Student Guide (Layout)
- Introduction to Computer Forensics
- Course Objectives
- The Legal System
- Criminal Incidents
- Civil Incidents
- Computer Fraud
- Internal Threats
- Investigative Challenges
- Common Frame of Reference
- Media Volume
Computer Forensic Incidents
- Lesson Objectives
- The Legal System
- Criminal Incidents
- Civil Incidents
- Computer Fraud
- Internal Threats
- Investigative Challenges
- Common Frame of Reference
- Media Volume
Investigation Process
- Lesson Objectives
- Investigating Computer Crimes
- Forensics Workstation
- Building Your Team of Investigators
- Decision Makers and Authorization
- Risk Assessment
- Forensic Investigation Toolkit
- Investigation Methodology
- Search Warrant
- Forensic Photography
- Collecting Physical Evidence
- Collecting Electronic Evidence
- Securing the Evidence
- Managing the Evidence
- Chain of Custody
- Data Analysis
- Assessing the Evidence
- Location Assessment
- Best Practices
- Documentation
- Expert Witness
- Closing the Case
OS Disk Storage Concepts
- Lesson Objectives
- Disk-Based Operating Systems
- OS / File Storage Concepts
- Disk Storage Concepts
- Digital Acquisition
- Digital Acquisition Procedures
- Digital Forensic Analysis Tools
Digital Acquisition and Analysis
- Lesson Objectives
- Digital Acquisition
- Digital Acquisition Procedures
- Digital Forensic Analysis Tools
Forensic Examination Protocols
- Lesson Objectives
- Forensic Examination Protocols
Digital Evidence Protocols
- Lesson Objectives
- Digital Evidence Concepts
- Digital Evidence Categories
- Computer Forensic Investigative Theory
- Digital Evidence Presentation
Computer Forensic Investigative Theory
- Lesson Objectives
- Computer Forensic Investigative Theory
Digital Evidence Presentation
- Lesson Objectives
- Digital Evidence Presentation
- Digital Evidence: Hearsay
- Digital Evidence: Summary
Computer Forensics Lab
- Lesson Objectives
- Overview
- Quality Assurance
- Standard Operating Procedures
- Reports
- Peer Review
- Lab Intake
- Tracking
- Storage
- Discovery
Computer Forensics Processing Techniques
- Lesson Objectives
- Computer Forensic Processing Techniques
Digital Forensics Reporting
- Lesson Objectives
- Analysis Report
- Ten Laws of Good Report Writing
Specialized Artifact Recovery
- Lesson Objectives
- Prep System Stage
- Windows File Date/Time Stamps
- Image File Databases
- Windows Registry
- Alternate Data Streams
- Windows Unique ID Numbers
- Historical Files
- Windows Recycle Bin
- Web E-mail
eDiscovery and ESI
- Lesson Objectives
- eDiscovery
- Metadata
- Data Retention Architecture
- eDiscovery Spoliation
- Tools for eDiscovery
Cell Phone Forensics
- Lesson Objectives
- Cell Phones
- Forensics Information in Cell Phones
- Subscriber Identity Module (SIM)
- Integrated Circuit Card Identification (ICCID)
- International Mobile Equipment Identifier (IMEI)
- Electronic Seal Number (ESN)
- Acquire Data from SIM Cards
- Cell Phone Forensic Tools
USB Forensics
- Lesson Objectives
- USB Components
- USB Forensics Investigation
- Tools for USB Imaging
Incident Handling
- Lesson Objectives
- Incident Handling Defined
- Incident Handling Steps
- The Incident Response Plan
- Incident Response Team Makeup
- Incident Response Training and Awareness
- Incident Handling
A1: PDA Forensics
- Lesson Objectives
- Personal Digital Assistants
- PDA Forensic Steps
- PDA Forensic Tools
A2: Investigating Harassment
- Lesson Objectives
- Sexual Harassment Overview
- Approach of General Investigation
- Conduct Your Investigation
- Preventative Action
This course is Accredited by the NSA-CNSS, Approved on Homelands Security NICCS Framework, and is on the FBI’s Tier 1-3 Certification Training Chart.
$3500.00
|
5 Days Course |