About This Course
Who this course is for:
- IT professionals
- Cyber security professionals
What you’ll learn:
- Everything you need to know about becoming a Certified Digital Forensics Examiner
This Official Mile2® cybersecurity certification training course covers everything you need to know about becoming a Certified Digital Forensics Examiner.
Students will learn about computer forensic incidents, the investigation process, disk storage concepts, digital acquisition and analysis, forensic examination protocols, digital evidence protocols, CFI theory, digital evidence presentation, computer forensic laboratory protocols, computer forensic processing, digital forensics reporting, specialized artifact recovery, e-Discovery and ESI, cell phone forensics, USB forensics, incident handling, PDA forensics, and investigating harassment.
Our Promise to You
By the end of this course, you will have learned everything you need to know about becoming a certified digital forensics examiner.
30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about digital forensics examiner.
Course Curriculum
8h 3m
Section 1 - Module 01 - Introduction & Course Overview | |||
Introduction And Course Overview | 00:00:00 | ||
Downloadable Materials | 00:00:00 | ||
Section 2 - Module 02 - Computer Forensics Incidents | |||
Computer Forensics Incidents | 00:00:00 | ||
Section 3 - Module 03 - Investigative Process | |||
Investigative Process | 00:00:00 | ||
Section 4 - Module 04 - Disk Storage Concepts | |||
Disk Storage Concepts | 00:00:00 | ||
Section 5 - Module 05 - Digital Acquisition & Analysis Tools | |||
Digital Acquisition & Analysis Tools | 00:00:00 | ||
Section 6 - Module 06 - Forensic Examination Protocols | |||
Forensic Examination Protocols | 00:00:00 | ||
Section 7 - Module 07 - Digital Evidence Protocols | |||
Digital Evidence Protocols | 00:00:00 | ||
Section 8 - Module 08 - CFI Theory | |||
CFI Theory | 00:00:00 | ||
Section 9 - Module 09 - Digital Evidence Presentation | |||
Digital Evidence Presentation | 00:00:00 | ||
Section 10 - Module 10 - Computer Forensic Laboratory Protocols | |||
Computer Forensic Laboratory Protocols | 00:00:00 | ||
Section 11 - Module 11 - Computer Forensic Processing | |||
Computer Forensic Processing | 00:00:00 | ||
Section 12 - Module 12 - Digital Forensics Reporting | |||
Digital Forensics Reporting | 00:00:00 | ||
Section 13 - Module 13 - Specialized Artifact Recovery | |||
Specialized Artifact Recovery | 00:00:00 | ||
Section 14 - Module 14 - e-Discovery And ESI | |||
e-Discovery and ESI | 00:00:00 | ||
Section 15 - Module 15 - Cell Phone Forensics | |||
Cell Phone Forensics | 00:00:00 | ||
Section 16 - Module 16 - USB Forensics | |||
USB Forensics | 00:00:00 | ||
Section 17 - Module 17 - Incident Handling | |||
Incident Handling | 00:00:00 | ||
Section 18 - Module 18 - PDA Forensics | |||
PDA Forensics | 00:00:00 | ||
Section 19 - Module 19 - Investigating Harassment | |||
Investigating Harassment | 00:00:00 |
Digital Forensics Examiner
Excellent course. Took me a bit longer because I took notes as the instructor taught. I learned SO MUCH. Makes me more aware of my personal digital footprint and m own security. Very detailed, very thorough. It was long, but long is necessary when the subject is complex.