Certified Professional Forensics Analyst (CPFA) Training

Network Intelligence have been providing professional computer forensics, cyber breach investigation, incident detection and response services to clients for more than 10 years. Network Intelligence brings together its consolidated expertise into a 3-day hands-on training on Certified Professional Forensic Analyst (CPFA). The entire workshop is driven by hands-on exercises and case studies to ensure that all aspects have a real-life scenario-based approach explaining from start to end of digital forensics investigation, incident detection and response.

Upon completion of the training, the participant would have an in-depth knowledge of the Digital forensics and incident response, its importance and implementation. The 12 hours of online course is spread across 3 days 4 hours each which includes 11 hours of training session followed by 1-hour online examination Below is the Table of Contents for the training. Below is the course outline of the training for your reference.

Training Details:

Americas, Europe & Canada

  • Date: July 19 - 21, 2021
  • Timing: 1:00 PM to 5:00 PM (GMT)
  • Duration: 4 hours every day for 3 days
  • Mode: Online through Microsoft Teams
  • Region: Americas, Europe & Europe
  • Fees:
    • USD $ 120 (for ISACA members)
    • USD $ 150 (for non-ISACA members)
Register your interest

Asia and Middle East

  • Date: July 26 -28, 2021
  • Timing: 6:00 AM – 10:00 AM (GMT)
  • Duration: 4 hours every day for 3 days
  • Mode: Online through Microsoft Teams
  • Region: Asia & Middle East
  • Fees:
    • USD $ 120 (for ISACA members)
    • USD $ 150 (for non-ISACA members)
Register your interest

Objective of the program:
  • What should one do when there is a suspicion of a computer-based crime?
  • What tools and techniques are most likely to yield the right set of clues?
  • What is the procedure to deal with incident response and remediation?
  • How should the investigation be carried out such that it can be presented in a court of law?
  • Demonstration with the worlds’ leading forensics tool – Encase.


Table of Content:
Session 1: Computer Crimes & Case Studies
  • Hacking Incidents
  • Financial Theft
  • Identity Theft
  • Corporate Espionage
  • Email Misuse
  • Case Studies
Session 2: Introduction to Incident Response
  • Pre-incident Preparation
  • Detection of Incidents
  • Initial Response Phase
  • Response Strategy Formulation
  • Incident Management Process
  • Writing An Incident Response Plan
  • Incident Response Runbooks
  • SIEM Use Cases – Kill Chain
Session 3: Digital Forensics
  • Introduction to Digital Forensic
  • Chain of Custody
  • Evidence Collection & Analysis
  • The 6 A’s of Digital Forensics
  • Network Forensics
  • Live Forensics
  • Windows Live Response
  • Linux Live response
  • Browser Forensics
Session 4: Forensic Imaging
  • Introduction to Imaging
  • Importance of Imaging
  • Integrity of the Evidence
  • Disk Imaging using Encase / FTK
  • Write Blockers
  • Memory Analysis
  • Tools for Acquiring RAM Dump
  • Volatility Framework
  • Email Forensics
  • Introduction to Steganography
Session 5: Finding IOC’s & Forensic Report Writing
  • Gathering Indicators of Compromise (IOC’s)
  • Report Writing Skills
  • Sample Report
  • Common Mistakes in Reports
Sample Certificate:


Terms & Conditions:
  • Fees, speakers and date are subject to change.
  • Any cancellations received within the last ten calendar days would be liable for 50% of the course fees. Cancellations must be received in writing at least one week prior to course commencement. No-shows would be fully charged.
  • Registered attendees who are unable to attend the above course can send replacements subject to one week’s notification. * Membership fee applies.
Privacy Notice:

We are committed to respecting your privacy and we recognize the importance of protecting the information collected about you. All of the personal information that you have submitted during the registration shall only be processed in relation to your attendance to this event (i.e., processing of payments, issuance of certificate, sending of any announcements, future events and activities). All the information that you have provided in relation to this event shall be protected with reasonable and appropriate measures and shall only be retained as long as necessary in its processing.