Certified Digital Forensics Examiner

This course prepares you for the Mile2 C)DFE exam. This training will benefit organizations, individuals, government offices, and law enforcement agencies interested in pursuing litigation, proof of guilt, or corrective action based on digital evidence. You will learn the methodology for conducting a computer forensic examination using forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-custody, and write a findings report.

$950.00

Request More Information:

1
keyboard_arrow_leftPrevious
Nextkeyboard_arrow_right
FormCraft - WordPress form builder

Program Duration

10 Half-Days
40 Flex Classroom Hours

Instructor

 

Johnny Justice

Johnny has been in the U.S. Army for over 12 years working as a Counterintelligence Agent (Computer Forensics, 7 years). he has been teaching UNIX/LINUX, Network Essentials, and Theories and Application / Digital Technology at the college level and has developed several high level Linux and Digital forensics course curriculum. Johnny holds a variety of certifications: C)DFE, CEI, CSSA, ECSA, CHFI, Linux+, and CEH.

Johnny authored the Certified Digital Forensics Examiner course at Mile2 and was recently featured in eforensics magazine. He graduated Magna Cum-Laude in 2012 from Nova Southeastern University with a Master’s of Science degree in Computer Science Education.

Course Outline

Chapter 01 – Introduction & Course Overview
Chapter 02 – Computer Forensics Incidents
Chapter 03 – Investigative Process
Chapter 04 – Disk Storage Concepts
Chapter 05 – Digital Acquisition & Analysis Tools
Chapter 06 – Forensic Examination Protocols
Chapter 07 – Digital Evidence Protocols
Chapter 08 – CFI Theory
Chapter 09 – Digital Evidence Presentation
Chapter 10 – Computer Forensic Laboratory Protocols
Chapter 11 – Computer Forensic Processing
Chapter 12 – Digital Forensics Reporting
Chapter 13 – Specialized Artifact Recovery
Chapter 14 – e-Discovery and ESI
Chapter 15 – Cell Phone Forensics
Chapter 16 – USB Forensics
Chapter 17 – Incident Handling
Chapter 18 – PDA Forensics
Chapter 19 – Investigating Harassment

Related Courses