Cnfe - Certified Network Forensics Examiner

Posted By: ELK1nG

Cnfe - Certified Network Forensics Examiner
Last updated 8/2018
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 7.56 GB | Duration: 15h 27m

Prepare for the Mile2® Certified Network Forensics Examiner Exam (CNFE) with this course.

What you'll learn
Have the knowledge to perform network forensic examinations.
Have knowledge to accurately report on their findings from examinations
Be ready to sit for the C)NFE Exam
Requirements
Must have a Digital or Computer Forensics Certification or equivalent knowledge
2 years of IT Security
Working Knowledge of TCP / IP
Description
This course is provided directly by Mile2®. This official Mile2® video includes an authorized exam prep and exam simulator, available upon request.The Certified Network Forensics Examiner vendor-neutral certification was developed for a U.S. classified government agency. The C)NFE takes a digital and network forensic skill set to the next level by navigating through over twenty modules of network forensic topics. The CNFE provides practical experience through our lab exercises that simulate real-world scenarios that cover investigation and recovery of data in a network, Physical Interception, Traffic Acquisition, Analysis, Wireless Attacks, and SNORT. The course focuses on the centralizing and investigating of logging systems as well as network devices.
The Certified Network Forensics Examiner exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2 account. The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $400 USD and must be purchased directly from Mile2®.

Overview

Section 1: Digital Evidence Concepts

Lecture 1 Digital Evidence Concepts

Section 2: Network Evidence Challenges

Lecture 2 Network Evidence Challenges

Section 3: Network Forensics Investigative Methodology

Lecture 3 Network Forensics Investigative Methodology

Section 4: Network-Based Evidence

Lecture 4 Network-Based Evidence

Section 5: Network Principles

Lecture 5 Network Principles

Section 6: Internet Protocol Suite

Lecture 6 Internet Protocol Suite

Section 7: Physical Interception

Lecture 7 Physical Interception

Section 8: Traffic Acquisition / Software Scanning

Lecture 8 Traffic Acquisition / Software Scanning

Section 9: Live Acquisition

Lecture 9 Live Acquisition

Section 10: Analysis

Lecture 10 Analysis

Section 11: Layer 2 Protocol

Lecture 11 Layer 2 Protocol

Section 12: Wireless Access Points

Lecture 12 Wireless Access Points

Section 13: Wireless Capture Traffic and Analysis

Lecture 13 Wireless Capture Traffic and Analysis

Section 14: Wireless Attacks

Lecture 14 Wireless Attacks

Section 15: NIDS Snort

Lecture 15 NIDS Snort

Section 16: Centralized Logging and Syslog

Lecture 16 Centralized Logging and Syslog

Section 17: Investigating Network Devices

Lecture 17 Investigating Network Devices

Section 18: Web Proxies and Encryption

Lecture 18 Web Proxies and Encryption

Section 19: Network Tunneling Scanning

Lecture 19 Network Tunneling Scanning

Section 20: Malware Forensics

Lecture 20 Malware Forensics

Digital & Network Forensic Engineers,IS & IT managers,Network Auditors