The Internet has made it easier to perpetrate crimes by providing criminals an avenue for launching attacks with relative anonymity. The increased complexity of the communication and networking infrastructure is making investigation of the cybercrimes difficult. Clues of illegal activities are often buried in large volumes of data that needs to be sifted through in order to detect crimes and collect evidence.



  • This course will prepare you in the disciplines of forensics investigations, incident response, memory forensics, network forensics, mobile device forensics, and reverse-engineering malware.
  • Conduct in-depth forensic analysis of Windows/Linux operating systems and media exploitation focusing on Windows 7, Windows 8/8.1, XP, and Windows Server 2008/2012
  • Identify artifact and evidence locations that will answer key questions, including questions about program execution, file opening, external device usage, geo-location, file download, anti-forensics, and system usage
  • Focus your capabilities on analysis instead of how to use a specific tool
  • Extract key answers by utilizing proper analysis via a variety of free, open-source, and commercial tools.


This training is designed specifically for those who have little or no previous experience with digital forensics, as well as those who just want to understand more about the techniques in digital forensics and what experts are doing,

  • Law Enforcement Agencies,
  • IT Security Professionals,
  • IT Security Administrators,
  • IT Auditors,
  • Heads-IT,
  • Systems Security Administrators and
  • IT Security Consultants.