Certified Network Forensics Examiner (CNFE) E-Learning and Exam

This self-study package from Mile2 contains: Course video, e-book, e-prep Guide, E-lab Guide, Exam Simulator, 1 week Cyberrange, 1 Year Courseware Access and 1 Year Exam Voucher.

  • Aan de slag!
  • Offerte aanvragen

    Offerte aanvraag training

    Vul hier al je gegevens in waarvoor je een offerte wilt ontvangen.

    "*" geeft vereiste velden aan

    Vul hier jouw naam in*
    Zou je hieronder de informatie die we nodig hebben willen invullen? Denk aan het aantal deelnemers voor de offerte, eventuele specifieke wensen, en dergelijke.

    Wij zijn dé IT-opleider van het noorden

    • Train bij ons in Drachten of op jouw eigen locatie.
    • Klanten geven ons een 9.2
    • Erkende trainers.
    • Ontvang een certificaat na deelname!

    Kom je er niet uit?
    Laat ons je helpen!

    Contact opnemen

    x

Direct aan de slag!

  • Studeer in je eigen tijd en tempo
  • 365 Dagen toegang
  • Taal: Engels

€1249,- Excl. BTW

Algemene omschrijving

This self-study package from Mile2 contains: Course video, e-book, e-prep Guide, E-lab Guide, Exam Simulator, 1 week Cyberrange, 1 Year Courseware Access and 1 Year Exam Voucher.

The Certified Network Forensics Examiner vendor-neutral certification was developed for a U.S. classified government agency. The C)NFE takes a digital and network forensic skill set to the next level by navigating through over twenty modules of network forensic topics. The CNFE provides practical experience through our lab exercises that simulate real-world scenarios that cover investigation and recovery of data in a network, Physical Interception, Traffic Acquisition, Analysis, Wireless Attacks, and SNORT. The course focuses on the centralizing and investigating of logging systems as well as network devices.

CPE's: 40.

Doelgroep

  • Digital & Network Forensic Engineers
  • IS & IT managers
  • Network Auditors

Leerdoelen

Participants will be able to apply forensically-sound best practice techniques against virtual infrastructure entities in the following use case scenarios:

  • Identifying direct evidence of a crime
  • Attributing evidence to specific suspects
  • Confirming (or negating) suspect alibis
  • Confirming (or negating) suspect statements
  • Determining (or negating) suspect intent
  • Determining (or negating) Identifying sources
  • Determining (or negating) Authenticating documentsP
  • Have the knowledge to perform network forensic examinations.
  • Have the knowledge to accurately report on their findings from examinations
  • Be ready to sit for the C)NFE Exam

Voorkennis

  • Must have a Digital or Computer Forensics Certification or equivalent knowledge.
  • 2 years of IT Security.
  • Working Knowledge of TCP/IP.

Onderwerpen

  • Module 1: Digital Evidence Concepts.
  • Module 2: Network Evidence Challenges.
  • Module 3: Network Forensics Investigative Methodology.
  • Module 4: Network-Based Evidence.
  • Module 5: Network Principles.
  • Module 6: Internet Protocol Suite.
  • Module 7: Physical Interception.
  • Module 8: Traffic Acquisition Software Scanning.
  • Module 9: Live Acquisition.
  • Module 10: Analysis.
  • Module 11: Layer 2 Protocol.
  • Module 12: Wireless Access Points.
  • Module 13: Wireless Capture Traffic and Analysis.
  • Module 14: Wireless Attacks.
  • Module 15: NIDS Snort.
  • Module 16: Centralized Logging and Syslog.
  • Module 17: Investigating Network Devices.
  • Module 18: Web Proxies and Encryption.
  • Module 19: Network Tunneling Scanning.
  • Module 20: Malware Forensics.