Digital Forensics

The field of digital forensics is in high demand due to the constant threat of data breaches and information hacks. Our digital forensics courses walk you through best practices for everything from incident response to deep dives into forensic computing. Learn from expert authors how to identify and remediate vulnerabilities and better communicate breaches to those impacted.

Courses
Newest Courses
USB devices have become part of many forensic investigations and penetration tests. In this course, USB Forensics: Writeblocking and Impersonation, you'll learn USB forensics and penetration testing with the USB forensics writeblocking and impersonation. First, you'll explore easily and cheaply...
USB devices, especially flash drives, have become commonplace. As a result, USB storage devices are frequently a part of forensic investigations. An easy way of making forensic copies of USB storage devices is needed to facilitate such investigations. This course centers around building an...
This course is the first in a series to cover USB in depth. Throughout the series, emphasis will be placed on USB mass storage devices which are nearly always a part of forensic investigations. USB Human Interface Devices (HID) will also be discussed as they are used in a number of attacks....
Kali Linux (formerly BackTrack) is best known as the premier Linux distribution system for application and network penetration testers. Kali also includes many digital forensics tools that are useful for formal forensics investigations, solving problems in Information Technology, and learning...
Since finding malware is a common occurrence for anyone that performs incident response, knowing how to properly analyze that malware is an essential skill. In this course, Malware Analysis Fundamentals, you'll gain the ability to analyze malware. First, you'll explore how to keep yourself and...
Every day a new breach occurs at companies large and small. Some impact tens of millions of customers, destroy a company's reputation, consumer trust, or investor confidence. Some breaches go unnoticed for months or years and quietly leak sensitive information, company secrets, customer data,...
This course prepares students for the compliance and operational security section of the CompTIA Security+ (SY0-401) exam. This course deals with security issues such as compliance, risk mitigation, basic forensic procedures and environmental controls used to increase reliability, resiliency,...
Computer virus outbreaks are becoming more complex and use clever deployment tactics that trick people into getting infected, even without their knowledge. Traditional antivirus technologies have a hard time keeping up. There is a need for security analysts that are able to tackle these...
Cyber-criminals are innovating faster than ever, and the cyber-crime industry caused the loss of hundreds of billions of dollars last year across the US and Europe alone. In this course, Advanced Malware Analysis: Combating Exploit Kits, you'll learn the skills you need to pull apart and...
The easiest way to get into a system or network is to get someone to let us in. Do you pirate software, movies, music, or heaven forbid - an operating system? I'm about 99.999% sure you've already been pwned. Malware is specifically designed to gain access or damage systems without the...