CCFP: Certified Cyber Forensics Professional

CCFP: Certified Cyber Forensics Professional Course Description

Duration: 6.00 days (72 hours)

This high-intensity training uses the latest tools and techniques in a live, hands-on laboratory environment to conduct a simulated cyber investigation. The lab exercises include computer forensics using commercial tools, network forensics and Internet forensics. Such areas as email, applications, forensic timeliners, social media and mobile devices will be addressed in addition to the traditional computer forensics examinations.

Outside of the laboratory exercises, students address legal and ethical considerations, the foundations of digital forensic science within the context of the forensic sciences, and emerging and hybrid technologies as they impact the digital forensic investigator. The course is a combination of instructor lecture, hands-on lab exercises, instructor demonstrations and practicum exam with after-exam review.

Next Class Dates

Contact us to customize this class with your own dates, times and location. You can also call 1-888-563-8266 or chat live with a Learning Consultant.

Back to Top

Intended Audience for this CCFP: Certified Cyber Forensics Professional Course

  • » The Certified Cyber Forensics Professional (CCFP) course is designed for intermediate to advanced professionals who possesses at least three years of experience in the areas of: forensic techniques and procedures, standards of practice, and legal and ethical principles that assure the accuracy, completeness, and reliability of digital evidence.
  • » The course is intended for intermediate to advanced cyber forensics professionals who have at least three years of recent full-time digital or IT security experience in cyber forensics.

Back to Top

Course Prerequisites for CCFP: Certified Cyber Forensics Professional

  • » Professional experience in forensics is required and will greatly enhance the learning environment.

Back to Top

CCFP: Certified Cyber Forensics Professional Course Objectives

  • » Analyze the nature of evidence, chain of custody, rules of procedure, and the role of expert witness as they pertain to the legal and ethical principles, concepts, methodologies, and their implementation within centralized and decentralized environments across an organization's computing environment
  • » Demonstrate an understanding of investigations as they relate to data communications in local area and wide area networks, remote access, and Internet/intranet/extranet configurations
  • » Analyze fundamental principles, forensic methods, forensic analysis and examination planning, and evaluate report writing and presentations as they relate to forensic science, applying a broad spectrum of science and technologies to investigate and establish facts in relation to criminal or civil law
  • » Analyze media and file systems, computer and operating systems, network, mobile devices, embedded devices, multimedia and content, virtual system forensics and the techniques and tools used in the collection of any digital evidence that can be defined as data or transmitted via electronic means
  • » Apply software forensics to file formats and metadata; analyze web, email, and messaging forensics; and understand database forensics and malware forensics
  • » Describe the developing technologies and the practice of applying comprehensive and rigorous methods for collecting evidence within the hybrid and emerging technologies of cloud forensics, social networks, the big data paradigm, controls systems, critical infrastructure, and online gaming and virtual/augmented reality

Back to Top

CCFP: Certified Cyber Forensics Professional Course Outline

      1. Domain 1 - Legal and Ethical Principles
        1. Module 1: Nature and Characteristics of Evidence
        2. Module 2: Chain of Custody
        3. Module 3: Rules of Procedure
        4. Module 4: Code of Ethics
      2. Domain 2 - Investigations
        1. Module 1: Investigative Process
        2. Module 2: Evidence Management
        3. Module 3: Crime Scene Investigation Protocol
        4. Module 4: Hybrid Crime Investigation
        5. Module 5: Criminal Investigations
        6. Module 6: Civil Investigations
        7. Module 7: Administrative Investigations
        8. Module 8: Forensics Responsibility to Security Incidents
        9. Module 9: Electronic Discovery
        10. Module 10: Intellectual Property (IP) Investigation
      3. Domain 3 - Forensic Science
        1. Module 1: Introduction to the Scientific Method
        2. Module 2: Fundamental Principles
        3. Module 3: Forensic Analysis and Examination Planning
        4. Module 4: Report Writing and Presentation
        5. Module 5: Quality Assurance, Control, Management and Accreditation Procedures
      4. Domain 4 - Digital Forensics
        1. Module 1: Digital Forensics Tools
        2. Module 2: Media and File System Forensics
        3. Module 3: Demonstration: Introduction to FTK
        4. Module 4: Anti-Forensic Tools and Techniques
        5. Module 5: Demonstration: Exploring the Evidence
        6. Module 6: Lab - The Evidence: Basher's Second Computer
        7. Module 7: Virtual System Forensics
        8. Module 8: Embedded Device Forensics
        9. Module 9: Mobile Device Forensics
        10. Module 10: Demonstration/Discussion: Cellebrite
        11. Module 11: A Few Forensic Tools and Techniques
        12. Module 12: Demonstration - Network Forensics
      5. Domain 5 - Application Forensics
        1. Module 1: Software Forensics
        2. Module 2: Web, Email, and Messaging Forensics
        3. Module 3: Demonstration - Web Forensics
        4. Module 4: Demonstration - Email Forensics
        5. Module 5: Database Forensics
        6. Module 6: Demonstration - Database Forensics
        7. Module 7: Lab - Creating and FTK Report
        8. Module 8: Malware Forensics
        9. Module 9: Demonstration - Malware Forensics
      6. Domain 6 - Hybrid and Emerging Technologies
        1. Module 1: Cloud Forensics
        2. Module 2: Social Networks
        3. Module 3: The Big Data Paradigm
        4. Module 4: Control Systems
        5. Module 5: Critical Infrastructure
        6. Module 6: Online Gaming and Virtual/Augmented Reality

Back to Top

Do you have the right background for CCFP: Certified Cyber Forensics Professional?

Skills Assessment

We ensure your success by asking all students to take a FREE Skill Assessment test. These short, instructor-written tests are an objective measure of your current skills that help us determine whether or not you will be able to meet your goals by attending this course at your current skill level. If we determine that you need additional preparation or training in order to gain the most value from this course, we will recommend cost-effective solutions that you can use to get ready for the course.

Our required skill-assessments ensure that:

  1. All students in the class are at a comparable skill level, so the class can run smoothly without beginners slowing down the class for everyone else.
  2. NetCom students enjoy one of the industry's highest success rates, and pass rates when a certification exam is involved.
  3. We stay committed to providing you real value. Again, your success is paramount; we will register you only if you have the skills to succeed.
This assessment is for your benefit and best taken without any preparation or reference materials, so your skills can be objectively measured.

Take your FREE Skill Assessment test »

Back to Top

Award winning, world-class Instructors

Donald H.
- Academic and corporate trainer with over 2000 hours of instruction delivered on security awareness, CISSP, Security+, Safety, core Microsoft courses, MS Exchange and MS ISA server.
- Conducted over 200 security reviews in support of financial audits, policy reviews and network vulnerability assessments.
- Bachelors Degree in Security Management with a Concentration in Information Security from American Military University along with CISSP, CAP and several CompTIA, Microsoft, ISACA certifications.


Donald is a security professional with a wide range of experience from physical security to a concentration in information security. He is the Information Systems & Security Director for a consulting firm. His clients include local municipalities, non-profits, corporations and federal government agencies, specializing in a wide array of compliance programs and security assessments such as PCI DSS, FISMA, COBIT and ISO17799.

Donald is also a trainer and speaker on security topics and has served on various advisory committees and as a subject matter expert in information technology and security. He has over 15 years of experience in the security field as well as more than 2000 hours of instruction delivered on security awareness, CISSP, Security+, Safety, core Microsoft courses and MS ISA server. In addition to that, Donald is the President and Chairmen for the Brentwood Veterans Memorial Building and Commandant for the Delta Diablo Det. 1155 Marine Corps League.
Jayson F.
- Over 32 years of experience as well as 18 certifications, including Cisco, CompTIA, and Microsoft.
- Strong background, with web development & design of infrastructure for companies such as AT&T, Sports Illustrated, and Toys R Us.
- Specialist in applying process and finding solutions to solve them in addition to training people in the skills to manage the process and meet goals.


Jayson is a talented and valued Microsoft Certified Trainer (MCT) with over 32 years of IT experience. Along with web development & design of infrastructure for companies such as AT&T, Sports Illustrated, and Toys R Us, he holds several IT certifications. He is a CCDA, CCNA, Security+ certified, MCDBA, and MCSE to name a few.

Jayson's focus is on finding solutions to problems and applying process to solve them. He instructs professionals in the skills to manage the process and meet goals, which makes him a respected trainer at NetCom Learning.
Larry G.
- More than 14 years of experience as a Security Subject Matter Expert as well as black belt in a variety of martial arts.
- Numerous Challenge Coins from the US Government including the US Army, and the Criminal Investigation Command.
- Much acclaimed instructor at NetCom Learning, with evaluation scores of 8.8 out of 9.


Larry is a unique instructor and IT security expert. If you sit in one of his classes you might get the feeling of being in a martial arts class - That's exactly how Larry wants it! "The principles behind IT security are the same as those in a variety of martial arts," Larry says. In addition to teaching IT security for over 14 years, he has practiced martial arts since he was 13 years old and holds black belts in multiple disciplines including Tai Chi, Kung Fu, and Kick Boxing. "All of these techniques are like tools for different types of attacks," Larry explains.

Larry's excellence in certification training and passion for IT security has earned him numerous Challenge Coins from the US Government including the US Army, and the Criminal Investigation Command. He is also a much acclaimed instructor at NetCom Learning, with evaluation scores of 8.8 out of 9.
John H.
- Owner of ELearning Development company that focuses on design, security education services and development.
- Globally recognized instructor of engineers and executives from the private sector, civilian government, and DoD.
- Consultant experience focusing on security architecture, instructional design, curriculum development, and training delivery.
Hackmeyer has a bachelor's and master's degree from Florida State University. "Hack", as he likes to be called, is currently the owner of thesecurity education services company CyberCrocodile. For nearly 6 years, CyberCrocodile has focused on delivering live instructional courses focused on CISSP, Security+ and customized vendor specific security solutions.

Prior to forming CyberCrocodile, Hack spent nearly a decade as a security systems engineer for companies such as: Intermedia Communications, Riptech, Symantec, and Websense. John has experience in architecting security solutions for govern- ment agencies, DoD and global fortune 500 companies.

Mr. Hackmeyer is also the creator of popular and effective educational methodology Conceptual Linking.

See more...   See more instructors...

Back to Top

Client Testimonials & Reviews about their Learning Experience

We are passionate in delivering the best learning experience for our students and they are happy to share their learning experience with us.
Read what students had to say about their experience at NetCom.   Read student testimonials...

Back to Top