Last updated 8/2018
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 7.56 GB | Duration: 15h 27m
Prepare for the Mile2® Certified Network Forensics Examiner Exam (CNFE) with this course.
What you'll learn
Have the knowledge to perform network forensic examinations.
Have knowledge to accurately report on their findings from examinations
Be ready to sit for the C)NFE Exam
Requirements
Must have a Digital or Computer Forensics Certification or equivalent knowledge
2 years of IT Security
Working Knowledge of TCP / IP
Description
This course is provided directly by Mile2®. This official Mile2® video includes an authorized exam prep and exam simulator, available upon request.The Certified Network Forensics Examiner vendor-neutral certification was developed for a U.S. classified government agency. The C)NFE takes a digital and network forensic skill set to the next level by navigating through over twenty modules of network forensic topics. The CNFE provides practical experience through our lab exercises that simulate real-world scenarios that cover investigation and recovery of data in a network, Physical Interception, Traffic Acquisition, Analysis, Wireless Attacks, and SNORT. The course focuses on the centralizing and investigating of logging systems as well as network devices.
The Certified Network Forensics Examiner exam is taken online through Mile2's Assessment and Certification System ("MACS"), which is accessible on your mile2 account. The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $400 USD and must be purchased directly from Mile2®.
Overview
Section 1: Digital Evidence Concepts
Lecture 1 Digital Evidence Concepts
Section 2: Network Evidence Challenges
Lecture 2 Network Evidence Challenges
Section 3: Network Forensics Investigative Methodology
Lecture 3 Network Forensics Investigative Methodology
Section 4: Network-Based Evidence
Lecture 4 Network-Based Evidence
Section 5: Network Principles
Lecture 5 Network Principles
Section 6: Internet Protocol Suite
Lecture 6 Internet Protocol Suite
Section 7: Physical Interception
Lecture 7 Physical Interception
Section 8: Traffic Acquisition / Software Scanning
Lecture 8 Traffic Acquisition / Software Scanning
Section 9: Live Acquisition
Lecture 9 Live Acquisition
Section 10: Analysis
Lecture 10 Analysis
Section 11: Layer 2 Protocol
Lecture 11 Layer 2 Protocol
Section 12: Wireless Access Points
Lecture 12 Wireless Access Points
Section 13: Wireless Capture Traffic and Analysis
Lecture 13 Wireless Capture Traffic and Analysis
Section 14: Wireless Attacks
Lecture 14 Wireless Attacks
Section 15: NIDS Snort
Lecture 15 NIDS Snort
Section 16: Centralized Logging and Syslog
Lecture 16 Centralized Logging and Syslog
Section 17: Investigating Network Devices
Lecture 17 Investigating Network Devices
Section 18: Web Proxies and Encryption
Lecture 18 Web Proxies and Encryption
Section 19: Network Tunneling Scanning
Lecture 19 Network Tunneling Scanning
Section 20: Malware Forensics
Lecture 20 Malware Forensics
Digital & Network Forensic Engineers,IS & IT managers,Network Auditors
Homepage
https://www.udemy.com/course/certified-network-forensics-examiner/
https://rapidgator.net/file/7196c79e49da9881f738f53ff04ece70/zbchy.Cnfe..Certified.Network.Forensics.Examiner.part1.rar.html
https://rapidgator.net/file/3fc8d40c3e229642d028ba13b3243595/zbchy.Cnfe..Certified.Network.Forensics.Examiner.part2.rar.html
https://rapidgator.net/file/dc8710afcca9e149865efafef813dcbe/zbchy.Cnfe..Certified.Network.Forensics.Examiner.part3.rar.html
https://rapidgator.net/file/94e32400b88aa34f3f3b0e4f087192c5/zbchy.Cnfe..Certified.Network.Forensics.Examiner.part4.rar.html
https://rapidgator.net/file/3281c2e21b3d95a578df7dbc97620048/zbchy.Cnfe..Certified.Network.Forensics.Examiner.part5.rar.html
https://rapidgator.net/file/acc71cb9b7ecc85440073f35506a80d4/zbchy.Cnfe..Certified.Network.Forensics.Examiner.part6.rar.html
https://rapidgator.net/file/1bf6cfc15e1a7a724c018ff010127f45/zbchy.Cnfe..Certified.Network.Forensics.Examiner.part7.rar.html
https://rapidgator.net/file/564052e8bccaaa6c405eb1528a6fbcea/zbchy.Cnfe..Certified.Network.Forensics.Examiner.part8.rar.html
https://uploadgig.com/file/download/35E8a6302a9b5340/zbchy.Cnfe..Certified.Network.Forensics.Examiner.part1.rar
https://uploadgig.com/file/download/7615538bdcc07750/zbchy.Cnfe..Certified.Network.Forensics.Examiner.part2.rar
https://uploadgig.com/file/download/dB088f64c4e5Cd74/zbchy.Cnfe..Certified.Network.Forensics.Examiner.part3.rar
https://uploadgig.com/file/download/a705dc1Dd0496A6B/zbchy.Cnfe..Certified.Network.Forensics.Examiner.part4.rar
https://uploadgig.com/file/download/09ef85aeC8a7740D/zbchy.Cnfe..Certified.Network.Forensics.Examiner.part5.rar
https://uploadgig.com/file/download/d5Fcd9131eDba901/zbchy.Cnfe..Certified.Network.Forensics.Examiner.part6.rar
https://uploadgig.com/file/download/1d49dc9e3080642a/zbchy.Cnfe..Certified.Network.Forensics.Examiner.part7.rar
https://uploadgig.com/file/download/C9efA308e4c98538/zbchy.Cnfe..Certified.Network.Forensics.Examiner.part8.rar
https://nitroflare.com/view/7A3EFB9760FB247/zbchy.Cnfe..Certified.Network.Forensics.Examiner.part1.rar
https://nitroflare.com/view/1F66B21BA2A22D5/zbchy.Cnfe..Certified.Network.Forensics.Examiner.part2.rar
https://nitroflare.com/view/FA775D6B7037CDA/zbchy.Cnfe..Certified.Network.Forensics.Examiner.part3.rar
https://nitroflare.com/view/A9C93B1F31A9705/zbchy.Cnfe..Certified.Network.Forensics.Examiner.part4.rar
https://nitroflare.com/view/1D9564948CC6208/zbchy.Cnfe..Certified.Network.Forensics.Examiner.part5.rar
https://nitroflare.com/view/59622AC614B687F/zbchy.Cnfe..Certified.Network.Forensics.Examiner.part6.rar
https://nitroflare.com/view/C2F774279FE50FF/zbchy.Cnfe..Certified.Network.Forensics.Examiner.part7.rar
https://nitroflare.com/view/860CB6ABC3157C6/zbchy.Cnfe..Certified.Network.Forensics.Examiner.part8.rar