Certified Advanced Digital Forensic Examiner (CADFE)
Fees: Rs 20000.00 for Indian residents
Eligibility: Graduate in any discipline
Duration: 30 Hrs
Score at least 70% to pass this course
The Certified Advanced Digital Forensic Examiner (CADFE) is for professionals working in the information security, computer forensics, and incident response fields. The certification focuses on core skills required to collect and analyses data from Windows, MAC and Linux computer systems.
Computer forensics is the collection, preservation, analysis, identification, and presentation of computer-related evidence that can be useful in criminal cases for the purpose of facilitation or furthering the reconstruction of events found to be criminal.
There are three things to take into consideration when carrying out computer forensic scenario or case. A computer can be the target of the crime, it can be the instrument of the crime or it can serve as an evidence repository storing valuable information about the crime. Knowing what role the computer played in the crime can of tremendous help when searching for evidence. This knowledge can also help reduce the time taken to package your evidence.
The Life of a Digital Forensic Examiner
The career of Digital Forensic Examiner (DFE) comes with many titles such as digital forensic examiner and computer forensic detective, computer forensic analyst and data recovery agents. Regardless of title, these professionals are in charge of the proper handling of all digital media involved in criminal cases. Another option for a career as a computer forensic analyst is within the business sector and involves finance management, economics, and market analysis.
Day-to-Day Job Duties of a Digital Forensic Examiner
The job duties of a Digital Forensic Examiner will vary, depending on the area chosen to work in. Most often, a computer forensic analyst will find their job requirements to include recovering deleted emails, recovering data that has been deleted or encrypted, and uncovering passwords. The data that is recovered through these techniques will then be used by law enforcement officials to help with on-going investigations. Depending on the type of evidence that is recovered, the data may also be used as evidence in court.
Who should attend this course?
- Auditors and financial fraud examiners
- Chief Security Officers and Chief Technology Officers
- Professionals seeking a career in computer forensics and cyber-crime investigations
- Security and Network Administrators