Certified Network Forensics Examiner (CNFE) Training

Print Friendly, PDF & Email
Introduction

Certified Network Forensics Examiner (CNFE) Training Workshop Course with hands-on lab Exercises (Instructor-led Online/Classroom Live)

ACCREDITATIONS & ACKNOWLEDGEMENTS

  • Accredited by the NSA CNSS 4011-4016
  • Mapped to NIST / Homeland Security NICCS’s Cyber Security Workforce Framework
  • Approved on the FBI Cyber Security Certification Requirement list (Tier 1-3)

The Certified Network Forensics Examiner (CNFE) Training Workshop/certification has been validated by the NSA for: CNSSI-4012, National Information Assurance Training Standard for Senior System Managers and NSTISSI – 4011, National Training Standard for Information Systems Security (INFOSEC).

This 5 day Certified Network Forensics Examiner Training advanced course was originally designed for a select U.S. Government Agency. The CNFE certification program will prepare students to exercise true advanced networking forensics techniques through the use of proprietary labs in our exclusive cyber range.

Exam Information:

  • The Certified Network Forensics Examiner exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2 account. The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $400 USD and must be purchased from us.

Student Materials:

  • Student Workbook
  • Student Prep Guide
  • Student Lab Guide
  • CPEs: 40

Certification Exams:

  • Mile2 CNFE – Certified Network Forensics Examiner (CNFE)

Duration: 5 days

Related Courses

Customize It!

  • We can adapt this Certified Network Forensics Examiner (CNFE) Training course to your group’s background and work requirements at little to no added cost.
  • If you are familiar with some aspects of this Certified Network Forensics Examiner Training course, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the Certified Network Forensics Examiner Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Certified Network Forensics Examiner Training course in manner understandable to lay audiences.
Certified Network Forensics Examiner (CNFE) Training - Audience / Target Group

The target audience for this Certified Network Forensics Examiner Training course:

  • Digital & Network Forensic Engineers
  • IS & IT managers
  • Network Auditors
Certified Network Forensics Examiner (CNFE) Training - Class Prerequisites

The knowledge and skills that a learner must have before attending this Certified Network Forensics Examiner Training course are:

  • Must have a Digital or Computer Forensics Certification or equivalent knowledge
  • 2 years of IT Security
  • Working Knowledge of TCP/IP
Certified Network Forensics Examiner (CNFE) Training - Objectives:

After completing this Certified Network Forensics Examiner Training course, students will be able to:

Participants will be able to apply forensically-sound best practice techniques against
virtual infrastructure entities in the following use case scenarios:

  • Identifying direct evidence of a crime
  • Attributing evidence to specific suspects
  • Confirming (or negating) suspect alibis
  • Confirming (or negating) suspect statements
  • Determining (or negating) suspect intent
  • Determining (or negating) Identifying sources
  • Determining (or negating) Authenticating documents
Certified Network Forensics Examiner (CNFE) Training - Course Content:

Introduction

  • Module 1: – Digital Evidence Concepts
  • Module 2: Network Evidence Challenges
  • Module 3: Network Forensics Investigative Methodology
  • Module 4: Network-Based Evidence
  • Module 5: Network Principles
  • Module 6: Internet Protocol Suite
  • Module 7: Physical Interception
  • Module 8: Traffic Acquisition Software Scanning
  • Module 9: Live Acquisition
  • Module 10: – Analysis
  • Module 11: Layer 2 Protocol
  • Module 12: Wireless Access Points
  • Module 13: Wireless Capture Traffic and Analysis
  • Module 14: Wireless Attacks
  • Module 15: NIDS Snort
  • Module 16: Centralized Logging and Syslog
  • Module 17: Investigating Network Devices
  • Module 18: Web Proxies and Encryption
  • Module 19: Network Tunneling Scanning
  • Module 20: Malware Forensics

LABS:

  • Module 4, 5 & 6: – Working with Captured Files
  • Module 7, 8, 9 10, 11: Evidence Acquisition
  • Module 12, 13, 14: Wireless Traffic Evidence Acquisition
  • Module 15: IDS/IPS Forensics
  • Module 16 & 21: Network forensics and investigating logs
  • Module 17 & 18: SSL & Encryption
  • Module 20: Malware Forensics

Certified Information Systems Security Officer Training (CISSO) Workshop course Wrap-Up

Request More Information

Time Frame: 0-3 Months4-12 Months

0