Certified Digital Forensics Examiner (C|DFE)
Click to Register
Overview: The C)DFE certification programme is an internationally recognised certification designed to train and professionally certify Cybercrime and Fraud Investigators. This certification enables professionals operating in the IT and cybersecurity ecosystem to detect breaches in digital systems and procedures and, more importantly, to handle digital evidence effectively using approved international best practices. Participants will be trained in electronic discovery and advanced investigation techniques, essential for anyone encountering digital evidence during investigations. The course will cover the methodology for conducting computer forensics examinations, including forensically sound investigative techniques. These techniques encompass evaluating the scene, collecting and documenting all relevant information, interviewing appropriate personnel, maintaining chain-of-custody, and writing a final report.
Through a risk-based approach, C)DFE professionals can make informed recommendations to Chief Information Security Officers (CISOs)/ IT Manager in the implementation of cost-effective security controls that align with business and industry standards. Upon completing this training, participants will be equipped to manage digital forensic investigations, maintain evidence integrity, and have the skill to support legal proceedings with sound forensic practices associated with digital evidence.
Course Modules:
- Computer Forensic Incidents
- Investigative Theory & Process
- Digital Acquisition and Analysis Tools
- Disk and Storages
- Live Acquisitions
- Windows Forensics, Linux Forensics & Mac Forensics
- Examination Protocols & Digital Evidence Protocols
- Digital Evidence Presentation
- Laboratory Protocols
- Specialised Artifact Recovery
- Advance Search Strings
- eDiscovery and ESI
- Mobile Forensics
- Incident Handling
- Reporting
- Practical/Lab Sessions
Target Audience
IT Managers/Officers, Forensic Investigators/Auditors, Chief Information Officers (CIOs), Information Security Professionals, Risk & Compliance Managers/Officers, Cloud Security Officers, and Professionals interested in cybercrime investigations.