Certified Digital Forensics Expert (CDFE)

by IIS (Institute of Information Security) Claim Listing

The term cyber-crime no longer refers only to hackers and other external attackers. Almost all every case of financial fraud or employee misuse involves a very strong element of computer-based evidence.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

IIS (Institute of Information Security) Logo

img Duration

Please Enquire

Course Details

The term cyber-crime no longer refers only to hackers and other external attackers. Almost all every case of financial fraud or employee misuse involves a very strong element of computer-based evidence.

NII Consulting has been providing professional computer forensics, cyber breach investigation, incident detection and response services to clients for more than 5 years.

It now brings together its consolidated expertise into a four-day hands-on training on Certified Professional Forensic Analyst (CPFA).The entire workshop is driven by hands-on exercises and case studies to ensure that all aspects have a real-life scenario-based approach.

 

Key Benefits Of Course:

The term cyber-crime no longer refers only to hackers and other external attackers. Almost all every case of financial fraud or employee misuse involves a very strong element of computer-based evidence. NII Consulting has been providing professional computer forensics, cyber breach investigation, incident detection and response services to clients for more than 5 the past four years.

It now brings together its consolidated expertise into a four-day hands-on training on Certified Digital Forensics Expert (CDFE).The entire workshop is driven by hands-on exercises and case studies to ensure that all aspects have a real-life scenario-based approach explaining start to end of digital forensics investigation, incident detection and response.

 

What Should One Do When There Is A Suspicion Of A Computer-based Crime?

  • What tools and techniques are most likely to yield the right set of clues?
  • What is the procedure to deal with incident response and remediation?
  • How should the investigation be carried out such that it can be presented in a court of law?
  • Demonstration with the worlds’ leading forensics tool – Encase
  • Working with Forensics Distros like SIFT, DEFT, etc.
  • Who should attend this course?
  • Auditors and financial fraud examiners
  • Chief Security Officers and Chief Technology Officers
  • Professionals seeking a career in computer forensics and cybercrime investigations
  • Security and Network Administrators

 

Table of Contents:

  • Session 1: Introduction to computer forensics
  • Session 2: Setting up a Computer Forensics Lab
  • Session 3: How to approach to crime scene
  • Session 4: Computer Investigation Process
  • Session 5: Forensic Imaging of the evidence
  • Session 6: Forensic Analysis of the evidence
  • Session 7: Steganography
  • Session 8: Email Crimes
  • Session 9: Investigating Network & log
  • Session 10: Mobile Forensics
  • Session 11: Forensic Report Writing
  • Session 12: Types of investigation
  • Session 13: Becoming an Expert witness
  • Pune Branch

    2nd Floor, Kataria Chambers, ITI Rd, Above Reliance Footprint, Pune
  • Mumbai Branch

    204, Ecospace Tower, 2nd Floor, Mumbai

Check out more Computer Forensics courses in India

Trainocate India Logo

Certified Information Security Manager

The CISM exam preparation course prepares learners to pass the CISM certification exam using proven instructional design techniques and interactive activities. The course covers all four of the CISM domains, and each section corresponds directly to the CISM Exam Content Outline.

by Trainocate India [Claim Listing ]
Vinsys Logo

Certified In The Governance of Enterprise IT (CGEIT) Certification Training

For organizations, governance of information has become a much essential matter to deal with. Companies have realized the value of enterprise IT governance and its impact on the overall functioning of the business.

by Vinsys
  • Price
  • Start Date
  • Duration
Zoom Technologies Logo

Cybersecurity Associate

The Cybersecurity Associate - SOC Analyst course is designed to provide a comprehensive understanding of the fundamental concepts and practical skills required to start a career in Cybersecurity. 

by Zoom Technologies [Claim Listing ]
  • Price
  • Start Date
  • Duration
O7 Services Logo

Cyber Security

Cyber security is a crucial discipline dedicated to safeguarding computer systems, networks, and data from unauthorized access, attacks, and damage. O7 Services provides a robust cyber security course that equips individuals with the skills and knowledge needed to pursue a career.

by O7 Services [Claim Listing ]
AV Infosec Logo

CISM

CISM course is offered by AV Infosec. AV Infosec is one of the modern-age information security training organizations focusing on trainings in IT & Cyber security and safe usage of technology with a vision to build a safe and secure cyberspace for all.

by AV Infosec [Claim Listing ]

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy