Certified Network Forensics Examiner

Our classes are always live and instructor led from our Exton, PA or EPIC Partner locations. Springhouse AnywhereLive options require Internet Access. Select classes are Guaranteed to Run (GTR). View our complete schedule policies.






The Certified Network Forensics Examiner vendor neutral certification was developed for a U.S. classified government agency. The C)NFE takes a digital and network forensic skill set to the next level by navigating through over twenty modules of network forensic topics.

The CNFE provides practical experience through our lab exercises that simulate real-world scenarios that cover investigation and recovery of data in network, Physical Interception, Traffic Acquisition, Analysis, Wireless Attacks and SNORT. The course focuses on the centralizing and investigating of logging systems as well as network devices.

Intended Audience

  • Digital & Network Forensic Engineers
  • IS & IT managers
  • Network Auditors

At Completion

Students will:

  • Have knowledge to perform network forensic examinations.
  • Have knowledge to accurately report on their findings from examinations
  • Be ready to sit for the C)NFE Exam


  • 2 years of networking experience
  • 2 years of IT Security
  • Working Knowledge of TCPIP

Exams & Certifications

The Certified Network Forensics Examiner certification exam is taken online through Mile2's Assessment and Certification System (MACS), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $400 USD and must be purchased from the store on Mile2.com.

  • Mile2 C)NFE


  • Student workbook
  • Student lab guide
  • Student Exam Prep guide

Course Outline

Module 1: Digital Evidence Concepts


Module 2: Network Evidence Challenges


Module 3: Network Forensics Investigative Methodology


Module 4: Network-Based Evidence


Module 5: Network Principles


Module 6: Internet Protocol Suite


Module 7: Physical Interception


Module 8: Traffic Acquisition Software


Module 9: Live Acquisition


Module 10: Analysis


Module 11: Layer 2 Protocol


Module 12: Wireless Access Points


Module 13: Wireless Capture Traffic and Analysis


Module 14: Wireless Attacks


Module 15: NIDS_Snort


Module 16: Centralized Logging and Syslog


Module 17: Investigating Network Devices


Module 18: Web Proxies and Encryption


Module 19: Network Tunneling


Module 20: Malware Forensics



Certified Network Forensics Examinerhttp://springhouse.com/course-catalog/CNFECertified Network Forensics Examiner

Get More Information




Help us prove you're not a robot:

 ‭(Hidden)‬ Catalog-Item Reuse

Microsoft Gold Partner


AXELOS Limited

The Microsoft Gold CPLS logo is a mark of Microsoft, Inc.

The PMI R.E.P. logo is a mark of the Project Management Institute, Inc.

ITIL® is a registered trade mark of AXELOS Limited.
IT Infrastructure Library® is a registered trade mark of AXELOS Limited
The Swirl logo™ is a registered trade mark of AXELOS Limited
Accredited course material is property of ITSM Academy.

Connect with us

Springhouse Education & Consulting Services

Corporate HQ:Eagleview Corporate Park
707 Eagleview Boulevard
Suite 207
Exton, PA 19341

610-321-3500 - info@springhouse.com