Certified Digital Forensics Expert (CDFE)

by IIS (Institute of Information Security) Claim Listing

The term cyber-crime no longer refers only to hackers and other external attackers. Almost all every case of financial fraud or employee misuse involves a very strong element of computer-based evidence.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

IIS (Institute of Information Security) Logo

img Duration

Please Enquire

Course Details

The term cyber-crime no longer refers only to hackers and other external attackers. Almost all every case of financial fraud or employee misuse involves a very strong element of computer-based evidence.

NII Consulting has been providing professional computer forensics, cyber breach investigation, incident detection and response services to clients for more than 5 years.

It now brings together its consolidated expertise into a four-day hands-on training on Certified Professional Forensic Analyst (CPFA).The entire workshop is driven by hands-on exercises and case studies to ensure that all aspects have a real-life scenario-based approach.

 

Key Benefits Of Course:

The term cyber-crime no longer refers only to hackers and other external attackers. Almost all every case of financial fraud or employee misuse involves a very strong element of computer-based evidence. NII Consulting has been providing professional computer forensics, cyber breach investigation, incident detection and response services to clients for more than 5 the past four years.

It now brings together its consolidated expertise into a four-day hands-on training on Certified Digital Forensics Expert (CDFE).The entire workshop is driven by hands-on exercises and case studies to ensure that all aspects have a real-life scenario-based approach explaining start to end of digital forensics investigation, incident detection and response.

 

What Should One Do When There Is A Suspicion Of A Computer-based Crime?

  • What tools and techniques are most likely to yield the right set of clues?
  • What is the procedure to deal with incident response and remediation?
  • How should the investigation be carried out such that it can be presented in a court of law?
  • Demonstration with the worlds’ leading forensics tool – Encase
  • Working with Forensics Distros like SIFT, DEFT, etc.
  • Who should attend this course?
  • Auditors and financial fraud examiners
  • Chief Security Officers and Chief Technology Officers
  • Professionals seeking a career in computer forensics and cybercrime investigations
  • Security and Network Administrators

 

Table of Contents:

  • Session 1: Introduction to computer forensics
  • Session 2: Setting up a Computer Forensics Lab
  • Session 3: How to approach to crime scene
  • Session 4: Computer Investigation Process
  • Session 5: Forensic Imaging of the evidence
  • Session 6: Forensic Analysis of the evidence
  • Session 7: Steganography
  • Session 8: Email Crimes
  • Session 9: Investigating Network & log
  • Session 10: Mobile Forensics
  • Session 11: Forensic Report Writing
  • Session 12: Types of investigation
  • Session 13: Becoming an Expert witness
  • Pune Branch

    2nd Floor, Kataria Chambers, ITI Rd, Above Reliance Footprint, Pune
  • Mumbai Branch

    204, Ecospace Tower, 2nd Floor, Mumbai

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy