Certified Virtualization Forensics Examiner | Mile2® - Cyber Security Certifications
Shopping cart
There are no products in your cart.
Log in




Certified Virtualization Forensics Examiner

Certified Virtualization Forensics Examiner

This course brings together two challenging areas facing IT security professionals today: incident response and virtualization. Forensics is at the heart of incident response, and therefore this training will focus on how to gather evidence relating to an incident – the what, when, where, who and why of an incident – within today’s common virtual environments. 




Accreditations & Acknowledgements

Accreditation And Certifications

Mile2 is: 

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)


Request Information when this class will run
(*) Required Fields
Please let us know your name.
Please let us know your email address.
Invalid Phone
Invalid Input
Invalid Input



Exam Information

The Certified Virtualization Forensics Examiner exam is taken online through your Mile2.com account. The exam will take 2 hours and consists of 100 multiple choice questions. 




Key Data

Course Title: Certified Virtualization Forensics Examiner

Duration: 5 Days

Language: English 

Class Format Options:

  • Instructor-led classroom
  • Instructor-led Online Training


Must have a Digital or Computer Forensics Certification or equivalent knowledge

Student Materials:

  • Student Workbook
  • Student Lab Guide

CEUs: 40


Course Objectives

  • Participants will be able to apply forensically-sound best practice techniques against virtual infrastructure entities in the following use case scenarios:

  • Identifying direct evidence of a crime
  • Attributing evidence to specific suspects
  • Confirming (or negating) suspect alibis
  • Confirming (or negating) suspect statements
  • Determining (or negating) suspect intent
  • Determining (or negating) Identifying sources
  • Determining (or negating) Authenticating documents


Who Should Attend?

Virtual infrastructure specialists (Architects, engineers, Administrators), Forensic investigators Forensic investigators




We will never spam you.

What Our Clients Say

Some Of Our Customers