Certified Digital Forensics Expert (CDFE)

Get Certification for Digital Forensics Expertise

The term cyber-crime no longer refers only to hackers and other external attackers. Almost all every case of financial fraud or employee misuse involves a very strong element of computer-based evidence. NII Consulting has been providing professional computer forensics, cyber breach investigation, incident detection and response services to clients for more than 5 the past four years. It now brings together its consolidated expertise into a four-day hands-on training on Certified Digital Forensics Expert (CDFE).The entire workshop is driven by hands-on exercises and case studies to ensure that all aspects have a real-life scenario-based approach explaining start to end of digital forensics investigation, incident detection and response.

Key Benefits of course

  • What should one do when there is a suspicion of a computer-based crime?
  • What tools and techniques are most likely to yield the right set of clues?
  • What is the procedure to deal with incident response and remediation?
  • How should the investigation be carried out such that it can be presented in a court of law?
  • Demonstration with the worlds’ leading forensics tool – Encase
  • Working with Forensics Distros like SIFT, DEFT, etc.

Who should attend this course?

  • Auditors and financial fraud examiners
  • Chief Security Officers and Chief Technology Officers
  • Professionals seeking a career in computer forensics and cybercrime investigations
  • Security and Network Administrators

Course Duration

  • 5 Days

Course Contents

  • Introduction to Forensics
  • History of Forensics
  • Computer – Facilitated Crimes
  • Computer Forensics: Rules, Procedures and Legal
  • Setting up a forensic lab
  • Operations performed in the lab
  • Services provided in computer forensics
  • Elements of facilities
  • Necessary considerations
  • Essential forensic tools
  • Where and when to do forensics
  • Accessing the case
  • Preservation of evidence
  • Collection of evidence
  • Examination of evidence
  • Analysis of evidence
  • Legal issues in forensics
  • Introduction
  • How investigation starts
  • Role of evidence
  • Investigation Methods
  • Securing Evidence
  • Investigating company policy
  • Documentation and reporting
  • Introduction to Imaging
  • Importance of Imaging
  • Hash algorithms
  • Integrity of the evidence
  • FTK Imaging
  • Encase Imaging
  • Helix Imaging
  • Win hex Imaging
  • Write Blockers
  • Introduction to analysis
  • Configuring the tool
  • Analysis using FTK
  • Analysis using Encase
  • Recovering files
  • Bookmarking evidence
  • Keyword searching
  • Password cracking
  • Email analysis
  • Reporting
  • Introduction
  • Analysis on steganography
  • Tools for steganography
  • Introduction
  • E-mail crimes and violation
  • Investigating email crimes and violations
  • Tracing an email
  • Dos Attacks
  • SQL injection
  • Web defacement
  • Shell / backdoors
  • Challenges faced during investigation
  • IPS/IDS
  • Snorting
  • Gathering logs
  • Investigating logs
  • Investigating wireless access point
  • Auditing
  • Introduction
  • Components of mobile forensics
  • Investigative methods
  • Blackberry forensics
  • Android forensics
  • iPhone Forensics
  • iPod Forensics
  • Introduction
  • Report Samples
  • Report writing skills
  • Common mistakes in report
  • Report submission
  • Corporate Espionage
  • Trademark and Copyright
  • Child pornography
  • Sexual harassment
  • Source Code theft
  • Insurance industry fraud
  • Introduction
  • Role of expert witness
  • Testifying as expert witness
  • Litigation support

Ethical Hacking Training

This course goes deep down into depths of networking, systems, web applications, actual exploitation & helps beginners to take their confident first step towards information security field.

  • 6 Weeks Comprehensive Training
  • Built by Experienced Professionals
  • Regularly update on tools, techniques in course content