Certified Network Forensic Analysis Manager (C-NFAM)

Cybersecurity Courses: Certified Network Forensic Analysis Manager

The Certified Network Forensic Analysis Manager training course was originally developed for the U.S. government, and has now been made available to city, county, and state law enforcement agencies. Civilian personnel outside of the law enforcement community are also authorized to attend and will receive practical training for their business environments.

This comprehensive course brings incident response and network forensic core competencies to advanced levels by presenting students with 12 detailed learning objectives. Students will be provided with both experiential knowledge and practical skills that simulate real-world scenarios, investigations, and recovery of evidentiary data in systems and networks. Students will cover topics such as: Incident Response Management; Live Data Collection; Analysis Methodology; Malware Triage; and, practical lab exercises utilizing the Wireshark packet capturing tool for network investigations.

NICE Cybersecurity Workforce Framework

The Certified Network Forensic Analysis Manager course is a component of the career progression track that supports the required Categories, Specialty Areas and Work Roles as defined by the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework.  It provides a common language to speak about cyber roles and jobs and can be referenced to define professional requirements in cybersecurity.

COUNTERINTELLIGENCE FORENSICS ANALYST
(IN-FOR-001)

ALL SOURCE-COLLECTION MANAGER
(CO-CLO-001)

CYBER DEFENSE INCIDENT RESPONDER
(PR-CIR-001)

CYBER CRIME INVESTIGATOR
(IN-INV-001)

CYBER DEFENSE FORENSICS ANALYST
(IN-FOR-002)

EXPLOITATION ANALYST
(AN-EXP-001)

Course Outline and Learning Objectives

Click the blue arrow to the left of the domain title to view an expanded list of domain learning objectives.

  • Network Forensics vs. Digital Forensics
  • What Constitutes an Incident?
  • The Incident Response Life Cycle
  • What is Incident Response?
  • Concept of the Attack Life Cycle
  • 7 Stages of the Attack Life Cycle
  • Common Security Incidents
  • Goals of Incident Response
  • Incident Response Team Considerations
  • Indicators of Compromise (IOC)
  • Analyzing Data Evidence
  • Tracking Investigative Information
  • Defining the Network Forensic Mission
  • Internal Communication Procedures
  • External Communication Procedures
  • Forensic Team Deliverables
  • Building a Field Forensic System
  • Preparing the Infrastructure
  • Time Zones and Investigative Timelines
  • Collecting Initial Facts
  • Network and Incident Checklists
  • Maintaining Case Notes
  • Building an Attack Timeline
  • Defining Leads of Value
  • Turning Leads into Indicators
  • The Life Cycle of Indicator Generation
  • Indicator Verification
  • Resolving Internal Leads
  • Reporting Findings to Law Enforcement
  • When to Perform a Live Response
  • Live Response Challenges
  • Selecting a Live Response Tool
  • Data Collection Considerations
  • Common Live Response Data
  • Collection Best Practices
  • The Case for Network Monitoring
  • Types of Network Monitoring
  • Setting Up a Network Monitoring System
  • Network Surveillance
  • Network Sensor Deployment
  • Network Logging Challenges
  • Enterprise Services
  • Dynamic Host Configuration Protocol
  • Domain Name Systems
  • Enterprise Management Applications
  • Antivirus Software
  • Web Servers
  • General Process for Performing Analysis
  • Available Sources of Data
  • Outlining the Analysis Approach
  • Selection of Analysis Methods
  • Special Considerations for Artifacts
  • Evaluating Analysis Results
  • Malware Triage Concepts
  • Malware Handling Procedures
  • Malware Distribution and Documentation
  • Physical and Virtual Triage Environments
  • Automated, Manual, Static, and Dynamic Analysis
  • Malware Runtime Monitoring
  • Effective Incident Remediation
  • Assigning a Remediation Owner
  • Remediation Posturing Actions
  • Eradication Plan Development
  • Plan Timing and Execution
  • Strategic Recommendations and Lessons Learned
  • Virtual Machine Setup in Kali Linux
  • The Wireshark User Interface
  • Customizing Wireshark Settings
  • Applying Capture Filters
  • Applying Display Filters
  • Color Rules and Packet Export
  • Creating Tables and Graphs
  • File and Object Reassembly
  • Adding Comments to Trace Files
  • Command-Line Capture Tools

Course Training Materials

Exam Prep Guide

Course Workbook & Labs

Lab Images (if Applicable)

Practice Assessment Quizzes

40-Hour CPE Credit Certificate

Knowledge Assessment Examination

Knowledge Assessment Exam

Digital Badge CNFAM Exam

Upon completion of self-study courses, students will be prepared to sit for the knowledge assessment exam. The online examination will consist of True/False, Multiple Choice, and Fill in the Blank questions. The exam may be taken at any time within one year of purchasing the certification course.

Students will have two hours to complete a computer-based examination consisting of 100 questions. A score of 70% or higher is required to earn the certification. Upon successful completion of the exam and a review of the proctor report, students will be mailed a hardcopy of their certification and their CPE credit documentation via USPS 2-Day mail within 72-hours of the exam date.

The examination is “closed book.” However, students will be allowed to use their notes on material presented during the course as well as their Course Workbooks.

Additional Information

LANGUAGE
English

DURATION
Self-Paced

LABS
Yes

CPE CREDIT
40 Hours

COURSE FEE
$1,200

Contact Us to Learn More

To find out more about Cybersecurity Courses and our full range of available client services, contact us today via the phone number or email address listed below.

OFFICE:
(912) 335-2217

EMAIL:
info@phase2advantage.com