Forensic Training Courses and Workshops

Schools providing training courses, certificates, diplomas or degree programs of Forensics




Total 800 training courses and degree programs available around the world.

United States - United Kingdom - Canada - Australia - India

Popular courses:
Computer Forensics
Criminology and Forensic Technology
Forensic Accounting
Forensic Psychology
forensic science
Computer Hacking Forensics Investigator (CHFI)


Certified Hacking Forensic Investigator (CHFI)

Course Format: Classroom
School/Trainer: ISInc
Training Center(s)/Venue(s): Sacramento, United States
  V

CHFI v8 is a comprehensive course covering major forensic investigation scenarios that enables students to acquire necessary hands-on experience regarding various forensic investigation techniques. Learn how to utilize standard forensic tools to successfully carryout a computer forensic investigation which can better prepare you to aid in the prosecution of perpetrators.

CHFI Computer Hacking Forensic Investigator (Certificate)

Course Format: Classroom
School/Trainer: GTC Economic Development and Corporate Training
Training Center(s)/Venue(s): Greenville, Simpsonville, Taylors, United States
  V

CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.

Digital Forensics

Course Format: Classroom
School/Trainer: Anne Arundel Community College
Training Center(s)/Venue(s): Annapolis, Arnold, Baltimore, Edgewater, Gambrills, Hanover, Laurel, Severn, United States
  V

Introduction to Digital Forensics: Evidence Handling and Incident Response Explore technical and legal fundamentals for handling digital evidence. Follow scenario-based approaches to evidence gathering, preservation and data acquisition. Learn to coordinate a response approach, seize evidence according to a scope of authority, and perform a legally defensible acquisition of data using industry standard commercial and open source digital forensics tools. Textbook information available at AACC Bookstore. CEUs issued.

Clinical Forensics

Course Format: Online
School/Trainer: Anne Arundel Community College
Training Center(s)/Venue(s): Annapolis, Arnold, Baltimore, Edgewater, Gambrills, Hanover, Laurel, Severn, United States
  V

Introduces students and professionals to the principles and practices of clinical forensics. Examines the history of violence, the causes and consequences of violence. Discusses methods utilized to identify victims of violent behavior and patterns of injuries consistent with intentional injurious acts. Provides a multidisciplinary approach to the management of those persons that have experienced injuries due to violence. Examines forensic science techniques associated with child abuse, partner abuse, elder abuse and sexual violence. Explores clinical forensic concerns and methods utilized during crime scene investigations. Includes violence prevention techniques.

Cyber Forensics

Course Format: Classroom
School/Trainer: Globe University - Wisconsin
Training Center(s)/Venue(s): Appleton, Eau Claire, La Crosse, Madison, Wausau, United States

This course covers the background
and history of computer crime. Topics include the evolution of computer crime,
computer investigations, crime scene processing, evidence management,
law enforcement investigations, and cyber law litigation.

Cyber Forensics

Course Format: Classroom
School/Trainer: Globe University Sioux Falls Campus
Training Center(s)/Venue(s): Sioux Falls, United States

This course covers the background
and history of computer crime. Topics include the evolution of computer crime,
computer investigations, crime scene processing, evidence management,
law enforcement investigations, and cyber law litigation.

Cyber Forensics

Course Format: Classroom
School/Trainer: Minnesota School of Business & Globe University
Training Center(s)/Venue(s): Blaine, Minneapolis, Richfield, Rochester, Woodbury, United States

This course covers the background
and history of computer crime. Topics include the evolution of computer crime,
computer investigations, crime scene processing, evidence management,
law enforcement investigations, and cyber law litigation.

Active Defense, Offensive Countermeasures and Cyber Deception

Course Format: Classroom
School/Trainer: Global Knowledge UAE
Training Center(s)/Venue(s): Abu Dhabi, Dubai, United Arab Emirates
  V

This course is based on the Active Defense Harbinger Distribution live Linux environment funded by the Defense Advanced Research Projects Agency (DARPA). This virtual machine is built from the ground up for defenders to quickly implement Active Defenses in their environments. The course is very heavy with hands-on activities - we won&,#146,t just talk about Active Defenses, we will work through labs that will enable you to quickly and easily implement what you learn in your own working environment.

Course Objectives

Track bad guys with callback Word documents

Use Honeybadger to track web attackers

Block attackers from successfully attacking servers with honeyports

Block web attackers from automatically discovering pages and input fields

Understand the legal limits and restrictions of Active Defense

Obfuscate DNS entries

Create non-attributable Active Defense Servers

Combine geolocation with existing Java applications

Create online social media profiles for cyber deception

Easily create and deploy honeypots

Web App Penetration Testing and Ethical Hacking

Course Format: Classroom
School/Trainer: Global Knowledge UAE
Training Center(s)/Venue(s): Abu Dhabi, Dubai, United Arab Emirates
  V


Apply a detailed, four-step methodology to your web application penetration tests: reconnaissance, mapping, discovery, and exploitation.

Analyze the results from automated web testing tools to validate findings, determine their business impact, and eliminate false positives.

Manually discover key web application flaws.

Use Python to create testing and exploitation scripts during a penetration test.

Discover and exploit SQL Injection flaws to determine true risk to the victim organization.

Create configurations and test payloads within other web attacks.

Fuzz potential inputs for injection attacks.

Explain the impact of exploitation of web application flaws.

Analyze traffic between the client and the server application using tools such as the Zed Attack Proxy and Burp Suite to find security issues within the client-side application code.

Manually discover and exploit Cross-Site Request Forgery (CSRF) attacks.

Use the Browser Exploitation Framework (BeEF) to hook victim browsers, attack client software and the network, and evaluate the potential impact that XS... [Read More]

Advanced Smartphone Forensics

Course Format: Classroom
School/Trainer: Global Knowledge UAE
Training Center(s)/Venue(s): Abu Dhabi, Dubai, United Arab Emirates
  V

FOR585.1: Smartphone Overview and Malware Forensics

FOR585.2: Android Forensics

FOR585.3: iOS Forensics

FOR585.4: Backup File and BlackBerry Forensics

FOR585.5: Third-Party Application and Other Smartphone Device Forensics

FOR585.6: Smartphone Forensics Capstone Exercise

Cyber Threat Intelligence

Course Format: Classroom
School/Trainer: Global Knowledge UAE
Training Center(s)/Venue(s): Abu Dhabi, Dubai, United Arab Emirates
  V

Construct and exploit threat intelligence to detect, respond, and defeat advanced persistent threats (APTs)
Fully analyze successful and unsuccessful intrusions by advanced attackers
Piece together intrusion campaigns, threat actors, and nation-state organizations
Manage, share, and receive intelligence on APT adversary groups
Generate intelligence from their own data sources and share it accordingly
Identify, extract, and leverage intelligence from APT intrusions
Expand upon existing intelligence to build profiles of adversary groups
Leverage intelligence to better defend against and respond to future intrusions.

Conventional network defenses such as intrusion detection systems and anti-virus tools focus on the vulnerability component of risk, and traditional incident response methodology pre-supposes a successful intrusion. However, the evolving sophistication of computer network intrusions has rendered these approaches insufficient to address the threats faced by modern networked organizations. Today&,#146,s adversaries accomplish their goals using advanced tools and techniques designed to circumvent most conventional co... [Read More]

Mac Forensic Analysis

Course Format: Classroom
School/Trainer: Global Knowledge UAE
Training Center(s)/Venue(s): Abu Dhabi, Dubai, United Arab Emirates
  V

This course provides the tools and techniques necessary to take on any Mac case without hesitation. The intense hands-on forensic analysis skills taught in the course will enable Windows-based investigators to broaden their analysis capabilities and have the confidence and knowledge to comfortably analyze any Mac or iOS system.

The FOR518: Mac Forensic Analysis Course will teach you:
1. Mac Fundamentals: How to analyze and parse the Hierarchical File System (HFS+) file system by hand and recognize the specific domains of the logical file system and Mac-specific file types.
2. User Activity: How to understand and profile users through their data files and preference configurations.
3. Advanced Analysis and Correlation: How to determine how a system has been used or compromised by using the system and user data files in correlation with system log files.
4. Mac Technologies: How to understand and analyze many Mac-specific technologies, including Time Machine, Spotlight, iCloud, Versions, FileVault, AirDrop, and FaceTime.

Advanced Network Forensics and Analysis

Course Format: Classroom
School/Trainer: Global Knowledge UAE
Training Center(s)/Venue(s): Abu Dhabi, Dubai, United Arab Emirates
  V


## Extract files from network packet captures and proxy cache files, allowing follow-on malware analysis or definitive data loss determinations

## Use historical NetFlow data to identify relevant past network occurrences, allowing accurate incident scoping

## Reverse engineer custom network protocols to identify an attacker&,#146,s command-and-control abilities and actions

## Decrypt captured SSL traffic to identify attackers&,#146, actions and what data they extracted from the victim

## Use data from typical network protocols to increase the fidelity of the investigation&,#146,s findings

## Identify opportunities to collect additional evidence based on the existing systems and platforms within a network architecture

## Examine traffic using common network protocols to identify patterns of activity or specific actions that warrant further investigation

## Incorporate log data into a comprehensive analytic process, filling knowledge gaps that may be far in the past

## Learn how attackers leverage man-in-the-middle tools to intercept seemingly secure communications
Read More]

Advanced Digital Forensics and Incident Response

Course Format: Classroom
School/Trainer: Global Knowledge UAE
Training Center(s)/Venue(s): Abu Dhabi, Dubai, United Arab Emirates
  V


Apply incident response processes, threat intelligence, and digital forensics to investigate breached enterprise environments from Advanced Persistent Threat (APT) groups, organized crime syndicates, or hackivists.

Discover every system comprised in your enterprise utilizing incident response tools such as F-Response and digital forensic analysis capabilities in the SIFT Workstation to identify APT beach head and spear phishing at- tack mechanisms, lateral movement, and data exfiltration techniques.
Using the SIFT Workstation&,#146,s capabilities, preform forensic analysis and incident response on any remote enterprise hard drive or system memory without having to image the system first, allowing for immediate response and scalable analysis to take place across the enterprise.
Using system memory and the Volatility toolset to discover active malware on a system, determine how the malware was placed there, and recover it to help develop key threat intelligence to perform proper scoping activities during incident response.
Detect advanced capabilities such as Stuxnet, TDSS, or APT command and control malware immediately through memory... [Read More]

Windows Forensic Analysis

Course Format: Classroom
School/Trainer: Global Knowledge UAE
Training Center(s)/Venue(s): Abu Dhabi, Dubai, United Arab Emirates
  V


Perform proper Windows forensic analysis by applying core techniques focusing on Windows 7/8/8.1

## Use full-scale forensic tools and analysis methods to detail nearly every action a suspect accomplished on a Windows system, including who placed an artifact on the system and how, program execution, file/folder opening, geo-location, browser history, profile USB device usage, and more

## Uncover the exact time that a specific user last executed a program through Registry and Windows artifact analysis, and understand how this information can be used to prove intent in cases such as intellectual property theft, hacker-breached systems, and traditional crimes

## Determine the number of times files have been opened by a suspect through browser forensics, shortcut file analysis (LNK), e-mail analysis, and Windows Registry parsing

## Identify keywords searched by a specific user on a Windows system in order to pinpoint the files and information that the suspect was interested in finding and accomplish detailed damage assessments

## Use Windows shellbags analysis tools to articulate every folder and directory that a use... [Read More]

Computer Hacking Forensic Investigator (CHFI) (Certificate)

Course Format: Classroom
School/Trainer: Global Knowledge UAE
Training Center(s)/Venue(s): Abu Dhabi, Dubai, United Arab Emirates
  V

CHFIv8 curriculum consists of 22 instructor-led training modules.
## Computer Forensics in Today’s World
## Computer Forensics Investigation Process
## Searching and Seizing Computers
## Digital Evidence
## First Responder Procedures
## Computer Forensics Lab
## Understanding Hard Disks and File Systems
## Windows Forensics
## Data Acquisition and Duplication
## Recovering Deleted Files and Deleted Partitions
## Forensics Investigation Using AccessData FTK
## Forensics Investigation Using EnCase
## Steganography and Image File Forensics
## Application Password Crackers
## Log Capturing and Event Correlation
## Network Forensics, Investigating Logs and Investigating Network Traffic
## Investigating Wireless Attacks
## Investigating Web Attacks
## Tracking Emails and Investigating Email Crimes
## Mobile Forensics
## Investigative Reports
## Becoming an Expert Witness

IBM Security QRadar Incident Forensics Configuration and Usage

Course Format: Classroom
School/Trainer: Global Knowledge USA IBM Training Centers
Training Center(s)/Venue(s): Arlington, Atlanta, Cary, Irving, Morristown, New York City, Santa Clara, Schaumburg, Seattle, United States
  V

In this course, QRadar SIEM administrators learn how to integrate and configure QRadar Incident Forensics in an existing QRadar SIEM deployment. End users such as Security Analysts learn how to use the QRadar Incident Forensics tools to effectively perform network forensics.

Course Content
Explanation of network forensics and the functions and aspects of IBM Security QRadar Incident Forensics 7.2.4
Integration of IBM Security QRadar Incident Forensics 7.2.4 in IBM Security QRadar SIEM 7.2.4
Administration of IBM Security QRadar Incident Forensics 7.2.4, creating cases, managing users, and configuring the Incident Forensics server.
Using the concepts and terminology of IBM Security QRadar Incident Forensics 7.2.4
Using IBM Security QRadar Incident Forensics 7.2.4 to analyze a network forensic case using the IBM Security QRadar Incident Forensics 7.2.4 Forensic search page and tools.

IBM Security QRadar Incident Forensics Configuration and Usage

Course Format: Classroom
School/Trainer: Global Knowledge Canada IBM Training Centres
Training Center(s)/Venue(s): Halifax, Mississauga, Montreal, Ottawa, Toronto, Winnipeg, Canada
  V

In this course, QRadar SIEM administrators learn how to integrate and configure QRadar Incident Forensics in an existing QRadar SIEM deployment. End users such as Security Analysts learn how to use the QRadar Incident Forensics tools to effectively perform network forensics.

Course Content
Explanation of network forensics and the functions and aspects of IBM Security QRadar Incident Forensics 7.2.4
Integration of IBM Security QRadar Incident Forensics 7.2.4 in IBM Security QRadar SIEM 7.2.4
Administration of IBM Security QRadar Incident Forensics 7.2.4, creating cases, managing users, and configuring the Incident Forensics server.
Using the concepts and terminology of IBM Security QRadar Incident Forensics 7.2.4
Using IBM Security QRadar Incident Forensics 7.2.4 to analyze a network forensic case using the IBM Security QRadar Incident Forensics 7.2.4 Forensic search page and tools.

IBM Security QRadar Incident Forensics Configuration and Usage

Course Format: Classroom
School/Trainer: Global Knowledge UK IBM Training Centres
Training Center(s)/Venue(s): Aberdeen, Bath, Bristol, Leeds, London, Wokingham, United Kingdom
  V

In this course, QRadar SIEM administrators learn how to integrate and configure QRadar Incident Forensics in an existing QRadar SIEM deployment. End users such as Security Analysts learn how to use the QRadar Incident Forensics tools to effectively perform network forensics.

Course Content
Explanation of network forensics and the functions and aspects of IBM Security QRadar Incident Forensics 7.2.4
Integration of IBM Security QRadar Incident Forensics 7.2.4 in IBM Security QRadar SIEM 7.2.4
Administration of IBM Security QRadar Incident Forensics 7.2.4, creating cases, managing users, and configuring the Incident Forensics server.
Using the concepts and terminology of IBM Security QRadar Incident Forensics 7.2.4
Using IBM Security QRadar Incident Forensics 7.2.4 to analyze a network forensic case using the IBM Security QRadar Incident Forensics 7.2.4 Forensic search page and tools.

IBM Security QRadar Incident Forensics Configuration and Usage

Course Format: Classroom
School/Trainer: Global Knowledge UAE IBM Training Center
Training Center(s)/Venue(s): Abu Dhabi, Dubai, United Arab Emirates
  V

In this course, QRadar SIEM administrators learn how to integrate and configure QRadar Incident Forensics in an existing QRadar SIEM deployment. End users such as Security Analysts learn how to use the QRadar Incident Forensics tools to effectively perform network forensics.

Course Content
Explanation of network forensics and the functions and aspects of IBM Security QRadar Incident Forensics 7.2.4
Integration of IBM Security QRadar Incident Forensics 7.2.4 in IBM Security QRadar SIEM 7.2.4
Administration of IBM Security QRadar Incident Forensics 7.2.4, creating cases, managing users, and configuring the Incident Forensics server.
Using the concepts and terminology of IBM Security QRadar Incident Forensics 7.2.4
Using IBM Security QRadar Incident Forensics 7.2.4 to analyze a network forensic case using the IBM Security QRadar Incident Forensics 7.2.4 Forensic search page and tools.

Pages: 1 2 3 4 5 6 ...


Find Forensic training courses, certificates, diplomas and degrees in Countries:



Australia - Canada - India - Indonesia - Ireland - Malaysia - New Zealand
Pakistan - Philippines - Singapore - South Africa - United Arab Emirates
United Kingdom - United States



Facts:
We serve the schools and students around the world. Major visitors come from India, United States, United Kingdom, Canada, Australia, Philippines, Malaysia, Singapore and South Africa.



- Other Topics -
- Online/E-learning -
Forensic
Ask for Training
Add Courses