Certified Network Forensics Examiner

Become a Certified Network Forensics Examiner and master the advanced techniques in data recovery and network investigation, ideal for IT managers and network security professionals aiming to secure their systems.

Course Thumbnail

Essential Skills Gained

Checkmark

Perform comprehensive network forensic examinations.

Checkmark

Accurately report findings from forensic examinations.

Checkmark

Prepare confidently for the C)NFE Exam.

Checkmark

Investigate and secure network devices using advanced forensic tools.

Format

  • Instructor-led
  • 5 days with lectures and hands-on labs.

Audience

  • Digital & Network Forensic Engineers
  • IS & IT Managers
  • Network Auditors

Description

The Certified Network Forensics Examiner vendor neutral certification was developed for a U.S. classified government agency. The C)NFE takes a digital and network forensic skill set to the next level by navigating through over twenty modules of network forensic topics. The CNFE provides practical experience through our lab exercises that simulate real-world scenarios that cover investigation and recovery of data in network, Physical Interception, Traffic Acquisition, Analysis, Wireless Attacks and SNORT. The course focuses on the centralizing and investigating of logging systems as well as network devices. Mile2 Accreditations: 

  1. Accredited by the NSA CNSS 4011-4016
  2. Is approved and has been placed on Homeland Security's National Initiative for Cyber Security Careers and Studies (NICCS) training providers and maps to the National Cybersecurity Workforce Framework
  3. Preferred cyber certification for the FBI

Calendar icon

Upcoming Course Dates

October 27-31, 2025

9:00 AM - 5:00 PM

Virtual: Online - US/Eastern

Enroll

$3500

Course Outline

Download PDF

Module 1: Digital Evidence Concepts

Module 2: Network Evidence Challenges

Module 3: Network Forensics Investigative Methodology

Module 4: Network-Based Evidence

Module 5: Network Principles

Module 6: Internet Protocol Suite

Module 7: Physical Interception

Module 8: Traffic Acquisition Software

Module 9: Live Acquisition

Module 10: Analysis

Module 11: Layer 2 Protocol

Module 12: Wireless Access Points

Module 13: Wireless Capture Traffic and Analysis

Module 14: Wireless Attacks

Module 15: NIDS_Snort

Module 16: Centralized Logging and Syslog

Module 17: Investigating Network Devices

Module 18: Web Proxies and Encryption

Module 19: Network Tunneling

Module 20: Malware Forensics

Your Team has Unique Training Needs.

Your team deserves training as unique as they are.

Let us tailor the course to your needs at no extra cost.