Digital Forensics Training: Tools and Techniques

Level: Advanced
RATING: 4.6/5 4.57/5 Based on 142 Reviews

This Digital Forensics training course will teach you the essential duties of a Forensic Examiner and cover the tools and techniques needed to prepare for and execute digital forensic investigations.

In addition to gaining experience in both a Windows and Linux investigative workstation, this course provides you with the skills equal to an entry-level digital forensic examiner to acquire, analyze, and report information — with exposure to advanced topics, such as live system and mobile forensics.

Key Features of this Digital Forensics Training:

  • After-course instructor coaching benefit
  • Learning Tree end-of-course exam included

You Will Learn How To:

  • Perform the essential duties of a forensic examiner
  • Prepare for and execute digital forensic investigations on Windows-based systems
  • Apply forensic methodologies to preserve, acquire, extract, and analyze information of investigative importance
  • Identify and analyze key Windows artifacts of investigative importance

Certifications/Credits:

CompTIA CPE 29 Credits

Choose the Training Solution That Best Fits Your Individual Needs or Organizational Goals

LIVE, INSTRUCTOR-LED

In Class & Live, Online Training

  • 5-day instructor-led training course
  • Earn 29 NASBA credits (live, in-class training only)
  • One-on-one after-course instructor coaching
  • Tuition can be paid later by invoice -OR- at the time of checkout by credit card
View Course Details & Schedule

Standard $3190

Government $2833

RESERVE SEAT

PRODUCT #2055

TRAINING AT YOUR SITE

Team Training

  • Bring this or any training to your organization
  • Full - scale program development
  • Delivered when, where, and how you want it
  • Blended learning models
  • Tailored content
  • Expert team coaching

Customize Your Team Training Experience

CONTACT US

Save More On Training with FlexVouchers – A Unique Training Savings Account

Our FlexVouchers help you lock in your training budgets without having to commit to a traditional 1 voucher = 1 course classroom-only attendance. FlexVouchers expand your purchasing power to modern blended solutions and services that are completely customizable. For details, please call 888-843-8733 or chat live.

In Class & Live, Online Training

  • Mar 11 - 15 ( 5 Days)
    9:00 AM - 4:30 PM EDT
    Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare) Reserve Your Seat

  • Apr 1 - 5 ( 5 Days)
    9:00 AM - 4:30 PM EDT
    Ottawa / Online (AnyWare) Ottawa / Online (AnyWare) Reserve Your Seat

  • Jun 24 - 28 ( 5 Days)
    9:00 AM - 4:30 PM EDT
    New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

  • Aug 12 - 16 ( 5 Days)
    9:00 AM - 4:30 PM EDT
    Rockville, MD / Online (AnyWare) Rockville, MD / Online (AnyWare) Reserve Your Seat

  • Sep 9 - 13 ( 5 Days)
    9:00 AM - 4:30 PM EDT
    Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare) Reserve Your Seat

  • Sep 30 - Oct 4 ( 5 Days)
    9:00 AM - 4:30 PM EDT
    Ottawa / Online (AnyWare) Ottawa / Online (AnyWare) Reserve Your Seat

Guaranteed to Run

When you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time, location — will run. Guaranteed.

Important Digital Forensics Course Information

Digital Forensics Course Outline

  • What is Digital Forensics?

    Defining digital forensics

    • Articulating the importance of Locard's Principle
    • Contextualizing digital forensics within incident response

    Explaining the role of digital forensics in investigations

    • Criminal, civil and intelligence/anti-terrorism investigations
    • Applying the scientific method to investigations

    Articulating the role of a digital forensic examiner

    • Maintaining objectivity within investigations
    • Ensuring confidentiality and integrity
  • Evaluating the Legal Landscape

    Exploring legal considerations of digital forensics

    • Respecting privacy rights and expectations
    • Addressing and reporting illegal information

    Defining and applying privacy principles

    • Outlining the twelve privacy principles
    • Addressing the duty to preserve in eDiscovery
  • Computing Fundamentals, Memory and Storage

    Examining the core operational principles of a computer

    • Inspecting hard drive storage and architecture
    • Reviewing the operations of computer memory

    Identifying multiple locations of digital evidence within a computer system

    • Investigating alternate data streams
    • Uncovering hidden data with Steganography
  • Configuring the Forensics Lab and Workstation

    Determining lab requirements

    • Key components of a digital forensics lab
    • Conducting tool validation

    Preparing and configuring a forensic workstation

    • Demonstrating appropriate use of a hardware write-blocker
    • Exploring key features of commercial and open source forensic software (e.g., EnCase, FTK, DD)

    Image acquisition

    • Creating bit-for-bit copies of digital evidence
    • Mounting and searching images
  • Handling and Collecting Evidence

    Documenting the physical and digital crime scene

    • Conducting crime scene photography
    • Executing triage techniques and methodologies

    Managing the chain of custody

    • Bagging and tagging physical evidence
    • Documenting and demonstrating evidence continuity
  • Analyzing and Investigating Evidence

    Identifying key Windows artifacts

    • Recovering and searching the Windows registry
    • Hibernation files, event logs, prefetch, shellbag and lnk files
    • Password hash extraction and cracking

    Performing keyword searching, bookmarking and timeline analysis

    • Developing strategies for effective keyword searching
    • Reconstructing the order of events with timeline analysis

    Conducting e-mail, web browser and USB investigations

    • Extracting and recovering deleted data from slack space
    • Tracking user activity and addressing Trojan Defense
  • Performing Mobile Forensics

    Safely handling mobile devices during investigations

    • Examining the use of Faraday bags
    • Demonstrating the use of mobile cables and write-blockers

    Preserving and acquiring evidence from mobile devices

    • Investigating evidence located within the address book, calendar, mail, apps and SMS
    • Recovering data from SIM cards
  • Conducting Live Memory Forensics

    Performing live memory acquisitions

    • Demonstrating the investigative value of live memory analysis on running systems
    • Utilizing open-source tools to capture and extract live memory

    Analyzing memory dumps for investigative information

    • Determining running processes, active network connections and recent commands
    • Identifying hidden processes and Malware

Team Training

Digital Forensics Training FAQs

  • What is digital forensics?

    Digital forensics is often in relation to computer crime, and encompasses the recovery and investigation of material found in digital devices.

  • Can I learn digital forensics online?

    Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.

Questions about which training is right for you?

call 888-843-8733
chat Live Chat




100% Satisfaction Guaranteed

Your Training Comes with a 100% Satisfaction Guarantee!*

  • If you are not 100 % satisfied, you pay no tuition!
  • No advance payment required for most products.
  • Tuition can be paid later by invoice - OR - at the time of checkout by credit card.

*Partner-delivered courses may have different terms that apply. Ask for details.

Alexandria, VA / Online (AnyWare)
Ottawa / Online (AnyWare)
New York / Online (AnyWare)
Rockville, MD / Online (AnyWare)
Alexandria, VA / Online (AnyWare)
Ottawa / Online (AnyWare)
Preferred method of contact:
Chat Now

Please Choose a Language

Canada - English

Canada - Français