Certified Digital Forensics Examiner

The Certified Digital Forensics Examiner program is designed to train Cyber Crime and Fraud Investigators whereby students are taught electronic discovery and advanced investigation techniques. This course is essential to anyone encountering digital evidence while conducting an investigation.

Benefits Of This Course:

The Certified Digital Forensics Examiner course will benefit organizations, individuals, government offices, and law enforcement agencies interested in pursuing litigation, proof of guilt, or corrective action based on digital evidence. An example of “corrective action” would be the termination of an employee for a violation of computer usage where digital evidence was needed to support the allegation. The investigator must furnish an irrefutable burden of proof based on that digital evidence. If not irrefutable, an attorney knowledgeable about Computer Forensics could have the case thrown out of court. Government or investigative agencies need proper training to succeed in cases like the above as well as those including acts of fraud, computer misuse, illegal pornography, counterfeiting, and so forth. Mile2’s Certified Digital Forensics Examiner training teaches the methodology for conducting a computer forensic examination. Students will learn to use forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-custody, and write a findings report.

The Certified Digital Forensics Examiner training covers a wide range of topics including:

  • Forensic Examination
  • Tools of the trade
  • Seizure Concepts
  • Incident Investigation
  • Fundamentals of conducting an effective computer forensic examination
  • Electronic Discovery and Digital Evidence

This 5-day course retails for Tk.5,000 and is delivered via: classroom, live online or self-study. The self-study course retails for Tk.2,000.

Learning Objectives

Module 1: Introduction
Module 2: Computer Forensic Incidents
Module 3: Investigation Process
Module 4: Disk Storage Concepts
Module 5: Digital Acquisition & Analysis
Module 6: Forensic Examination Protocols
Module 7: Digital Evidence Protocols
Module 8: CFI Theory
Module 9: Digital Evidence Presentation
Module 10: Computer Forensic Laboratory Protocols
Module 11: Computer Forensic Processing Techniques
Module 12: Digital Forensics Reporting
Module 13: Specialized Artifact Recovery
Module 14: e-Discovery and ESI
Module 15: Cell Phone Forensics
Module 16: USB Forensics
Module 17: Incident Handling
Appendix 1: PDA Forensics
Appendix 2: Investigating Harassment