Certified Virtualization Forensics Examiner This course takes two enormously challenging areas facing IT security professionals today: incidence response and virtualization and attempts to meld these together. Forensics is at the heart of incidence response, and therefore this training will focus on how to gather evidence relating to an incident – the what, when, where, who and why of an incident – within today’s common virtual environments. Additionally, the course will take a deep dive into the virtual infrastructure, and contrast the various virtual entities against their physical counterparts. This will allow a clear demonstration of the forensically-relevant differences between the virtual and physical environments. The course uses a lab-centric, scenario-based approach to demonstrate how to forensically examine relevant components of a virtual infrastructure for specific use cases. Accreditations & Acknowledgements Mile2 is: ACCREDITED by the NSA CNSS 4011-4016 MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3) Request Information when this class will run (*) Required Fields First & Last Name(*) Please let us know your name. Email(*) Please let us know your email address. Phone Number(*) Invalid Phone Class Title(*) Invalid Input Exam Information The Certified Virtualization Forensics Examiner exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $400 USD and must be purchased from Mile2.com. Course Outline Key Data Course Title: Certified Virtualization Forensics Examiner Duration: 5 Days Language: English Class Format Options: Instructor-led classroom Instructor-led Online Training Prerequisites: Must have a Digital or Computer Forensics Certification or equivalent knowledge Student Materials: Student Workbook Student Lab Guide CEUs: 40 Course Objectives Participants will be able to apply forensically-sound best practice techniques against virtual infrastructure entities in the following use case scenarios: Identifying direct evidence of a crime Attributing evidence to specific suspects Confirming (or negating) suspect alibis Confirming (or negating) suspect statements Determining (or negating) suspect intent Determining (or negating) Identifying sources Determining (or negating) Authenticating documents Who Should Attend? Virtual infrastructure specialists (Architects, engineers, Administrators), Forensic investigators Forensic investigators Get the Latest Cyber Security Certification Info Directly into Your Inbox We will never spam you.