Course History

Computer Forensics as a field was born and developed by U.S. federal law enforcement agents during the mid to late 1980s. New techniques were needed to meet the challenges of white-collar crimes being commit- ted with the assistance of a PC. By 1985 enforcement agents were being trained in the automated environ- ment and by 1989 software and protocols were beginning to emerge in the discipline. Mile2 originally had two forensics courses: CFED (Computer Forensics and Electronic Discovery) and AFCT (Advanced Forensics Computer Techniques). These courses and related materials were created by practitioners in the forensics field. In 2008 CFED and AFCT were combined into the CDFE course. Course content and materials are up- dated regularly to keep up with technology and concepts in the digital forensics field.

Course Content

Digital Forensics is the investigation and recovery of data contained in digi-tal devices. This data is often the subject of investigations in litigation, proof of guilt, and corrective action in an organization. When the time comes that you need to investigate your organization, will you have the skill set neces- sary to gather the digital data that you need? The Certified Digital Foren- sics Examiner course will benefit organizations, individuals, government offices, and law enforcement agencies in performing these investigations and reporting their findings.

To illustrate, let’s say an employee needs to be terminated for a violation of computer usage rules. To do so the organization must furnish an irrefutable burden of proof based on digital evidence. If not irrefutable, an attorney knowledgeable about Digital Forensics could have the case thrown out of court. Government and investigative agencies need proper training to suc- ceed in cases like the above as well as those including acts of fraud, com- puter misuse, illegal pornography, counterfeiting, and so forth. A C)DFE is aptly prepared to handle these types of situations.

Course Title : C)DFE – Certified Digital Forensic Examiner

Duration: 5 Days

Language: English

Class Format Options:

  • Instructor-led classroom

Also available as:


Attend live classes from anywhere in the world!

  • Our Live Online classes make use of industry standard meeting and collaboration technologies. Students use simple web based tools to view slides, the instructors desktop, and videos all while holding live audio (and chat ) discussions with the instructor.
  • During lab time, each remote student has a dedicated high spec remote PC. Students have full desktop access as if they were sitting in-front a PC in the actual computer lab.
  • The instructor monitors each student’s PC as they perform the labs remotely. The instructor can access the remote student’s system to demonstrate and assist in the event questions arise.
  • Public and private text chat allows for increased interactivity between students and instructor http://www.eta-i.org/tramadol.html during class in a way that prevents interruptions to other


  • C)SS : Security Sentinel
  • C)ISSO: Information System Security Officer or equivalent experience

Student Materials:

  • Student Workbook
  • Student Lab guide
  • Exam Prep Guide 

CEU’s: 40



  • Module 1: Introduction
  • Module 2: Computer Forensic Incidents Module 3: Investigation Process
  • Module 4: Disk Storage Concepts
  • Module 5: Digital Acquisition & Analysis
  • Module 6: Forensic Examination Protocols
  • Module 7: Digital Evidence Protocols Module 8: CFI Theory
  • Module 9: Digital Evidence Presentation
  • Module 10: Computer Forensic LaboratoryProtocols
  • Module 11: Computer Forensic Processing
  • Module 12: Digital Forensics Reporting
  • Module 13: Specialized Artifact Recovery
  • Module 14: e-Discovery and ESI
  • Module 15: Cell Phone Forensics
  • Module 16: USB Forensics
  • Module 17: Incident Handling

Appendix 1: PDA Forensics
Appendix 2: Investigating Harassment

Lab 1: Preparing Forensic Workstation
Lab 2: Chain of Custody
Lab 3: Imaging Case Evidence / FTK Manager Lab 4: Reviewing Evidence / Access Data Tools Review and Exam


Professional Roles:

  • Forensic Auditor
  • IT Auditor
  • Law Enforcement
  • Internal Auditor



Students will:

  • Have knowledge to perform digital forensic examinations
  • Have knowledge to accurately report on their findings from examinations Be ready to sit for the C)DFE Exam

The Certified Digital Forensics Examiner exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $300 USD and must be purchased from MACS



  • C)SS: Security Sentinel
  • C)ISSO: Information Systems
  • Security Officer
    Or equivalent experience 

No schedule at the moment