Download Interent ExplorerDownload Apple SafariDownload OperaDownload FirefoxDownload Google Chrome

Certified Network Forensics Examiner Training (CNFE)

Certified Network Forensics Examiner Training (CNFE)

Introduction:

Certified Network Forensics Examiner Training (CNFE) Workshop Course with hands-on lab Exercises – Duration: 5 Days (Instructor-led Online/Classroom Live)

ACCREDITATIONS & ACKNOWLEDGEMENTS

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS’s Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)

The Certified Network Forensics Examiner Training (CNFE) Workshop/certification has been validated by the NSA for: CNSSI-4012, National Information Assurance Training Standard for Senior System Managers and NSTISSI – 4011, National Training Standard for Information Systems Security (INFOSEC).

This 5 day Certified Network Forensics Examiner Training (CNFE) advanced course was originally designed for a select U.S. Government Agency. The CNFE certification program will prepare students to exercise true advanced networking forensics techniques through the use of proprietary labs in our exclusive cyber range.

Exam Information:

  • The Certified Network Forensics Examiner exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2 account. The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $400 USD and must be purchased from us.

Student Materials:

  • Student Workbook
  • Student Prep Guide
  • Student Lab Guide
  • CPEs: 40

Certification Exams:

  • Mile2 CNFE – Certified Network Forensics Examiner (CNFE)

Related Courses

Customize It:

  • If you are familiar with some aspects of Certified Network Forensics Examiner Training (CNFE), we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the Certified Network Forensics Examiner (CNFE) course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Certified Network Forensics Examiner (CNFE) course in manner understandable to lay audiences.

Certified Network Forensics Examiner Training (CNFE) – Audience/Target Group:

The target audience for this Certified Network Forensics Examiner (CNFE) course:

  • Digital & Network Forensic Engineers
  • IS & IT managers
  • Network Auditors

Certified Network Forensics Examiner Training (CNFE) – Course Prerequisites:

The knowledge and skills that a learner must have before attending this Certified Network Forensics Examiner (CNFE) course are:

  • Must have a Digital or Computer Forensics Certification or equivalent knowledge
  • 2 years of IT Security
  • Working Knowledge of TCP/IP

Certified Network Forensics Examiner Training (CNFE) – Objectives:

After completing this Certified Network Forensics Examiner (CNFE) course, students will be able to:

Participants will be able to apply forensically-sound best practice techniques against
virtual infrastructure entities in the following use case scenarios:

  • Identifying direct evidence of a crime
  • Attributing evidence to specific suspects
  • Confirming (or negating) suspect alibis
  • Confirming (or negating) suspect statements
  • Determining (or negating) suspect intent
  • Determining (or negating) Identifying sources
  • Determining (or negating) Authenticating documents

Certified Network Forensics Examiner Training (CNFE) – Course Syllabus

Introduction
  • Module 1: – Digital Evidence Concepts
  • Module 2: Network Evidence Challenges
  • Module 3: Network Forensics Investigative Methodology
  • Module 4: Network-Based Evidence
  • Module 5: Network Principles
  • Module 6: Internet Protocol Suite
  • Module 7: Physical Interception
  • Module 8: Traffic Acquisition Software Scanning
  • Module 9: Live Acquisition
  • Module 10: – Analysis
  • Module 11: Layer 2 Protocol
  • Module 12: Wireless Access Points
  • Module 13: Wireless Capture Traffic and Analysis
  • Module 14: Wireless Attacks
  • Module 15: NIDS Snort
  • Module 16: Centralized Logging and Syslog
  • Module 17: Investigating Network Devices
  • Module 18: Web Proxies and Encryption
  • Module 19: Network Tunneling Scanning
  • Module 20: Malware Forensics
LABS:
  • Module 4, 5 & 6: – Working with Captured Files
  • Module 7, 8, 9 10, 11: Evidence Acquisition
  • Module 12, 13, 14: Wireless Traffic Evidence Acquisition
  • Module 15: IDS/IPS Forensics
  • Module 16 & 21: Network forensics and investigating logs
  • Module 17 & 18: SSL & Encryption
  • Module 20: Malware Forensics
Certified Information Systems Security Officer Training (CISSO) Workshop course Wrap-Up

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

    Time frame: