C5W DIGITAL FORENSIC ANALYSIS - On-Demand Course
On-Demand Course Includes:
Course Material | Labs | Certification Attendance | Exam Voucher
The number of incidents being reported is rapidly increasing every year. Organizations need to respond to these incidents and investigate what, when, why, where, who, and how they happened. This requires special skills and knowledge in systems and how they operate. This is not a simple task that can be handled by an IT professional, but only those trained to acquire and analyze information in a forensically sound manner.
Cyber 5W Digital Forensic Analysis course will guide students on how to conduct digital investigations and write investigative forensic reports. This course uses an experiential learning process for training students, where students learn digital forensics by doing investigative tasks on real-world cases. Students will learn how to perform evidence acquisition and how to deal with disks and file systems, and then explore the forensic artifacts one may encounter when working with the Windows operating system.
Learners who complete the course and pass the exam will earn the C5W Certified Digital Forensic Analyst (CCDFA).
Welcome & Lab Access
Before You Start (Beginning of the Course)
Downloads
Upgrading Your VM Tools
Release Notes
Want to Build Your Own Environment?
Installing WSL2 on Windows 11
What is Digital Forensics
Digital Forensics Investigation
Check Your Knowledge #1
What is the Digital Evidence
Digital Devices
Legal Aspects
Types of Digital Forensic Investigation
Challenges of Digital Forensics
Alternative Windows VM for Labs
Lab #1 - Importing VMWare Virtual Machine
Importing Virtual Machine to VMWare
Configuring VMWare and VMTools
Configuring a Shared Directory between the Host and VM
Coping and Mounting CCDFA VHD Tools Drive
Adding Extra Drive to VM
Lab #2 - Importing VirtualBox Virtual Machine
Working with Virtual Hard Disk
Evidence Acquisition - Slides
Data Acquisition Concepts
Data Validation
Acquisition Methods
Forensic Image File formats
Check Your Knowledge #1
Why Evidence Acquisition Is Important?
Must-Know First Response actions
Sanitization
Hardwipe Tool
Cygwin Tools (dd command in Windows)
Check Your Knowledge #2
Required Files
Lab #1 - Sanitizing the Target Media
Lab #1 - Sanitizing the Target Media (Solution)
Evidence Data Acquisition
Memory Dump
Memory Dump using WinPmem
Tools for Memory Dump
Disk Drive Imaging
Other Forensic Tools
Required Files
Lab #2 - Creating Forensic Images
Lab #2 - Creating Forensic Images (Solution)
Examples of Hardware Acquisition Tools
Using UltraDock Write-Blocker
Resources
Introduction to Image Mounting
Arsenal Image Mounter
OSFMount
Other Forensic Image Mounting Tools
Check Your Knowledge #1
Required Files
Lab #1 - Mounting using AIM
Lab #1 - Mounting using AIM (Solution)
Resources
Working with FTK Imager - Slides
Forensic Toolkit Imager
Required Files
Install FTK Locally
Install FTK on a Portable Device (USB)
Required Files
Digital Evidence Acquisition
Memory Acquisition
Disk Acquisition
Check Your Knowledge #1
Lab #1 - Creating an E01 Image
Lab #1 - Creating an E01 Image (Solutions)
Lab #2 - Image Format
Lab #2 - Image Format (Solutions)
Lab #3 - Logical & Physical Image
Lab #3 - Logical & Physical Image (Solutions)
Required Files
Add Evidence Item to FTK Imager
Create and verify a multi-part disk images
Loading a multi-part disk image
Check Your Knowledge #2
Required Files
Evidence Analysis
Exporting Data using FTK Imager
Detect EFS Encryption
Lab #4 - Exporting Evidence
Lab #4 - Exporting Evidence (Solutions)
Acquiring Protected Registry Files
Copying Registry Files
Required Files
Interpreter
Lab #5 - Interpreting Evidence
Lab #5 - Interpreting Evidence (Solutions)
Required Files
Custom Content Images
AD Encryption
Lab #6 - Creating Custom Images
Lab #6 - Creating Custom Images (Solutions)
Required Files
Image Mounting
Steps of Image Mounting
Mount Multi-Part Raw Disk Image with FTK
Data Representation
Introduction to Numbering System
Decimal Number System (Base 10)
Binary System (Base 2)
Hexadecimal (Base 16)
Octal (Base 8)
Byte Ordering
Introduction to Text Code
ASCII Code
Unicode
Lab #1 - Numbering System
Lab #1 - Numbering System (Solutions)
Introduction to File Identification
Installation of HxD Editor
Working with HxD Editor
Installation of 010 Editor
Working with 010 Editor
010 Editor Course
Introduction to File Signature
Required Files
Text Files
Microsoft Word Files
PDF Files
TAR Files
Zip Files
PNG Files
JPEG Files
EXE Files
MP3 Files
MP4 Files
System Metadata
Embedded Metadata
Required Files
Lab #1 - Metadata & Hex-Editor Case 1
Lab #2 - Metadata & Hex-Editor Case 2
Lab #3 - Metadata & Hex-Editor Case 3
Lab - Metadata & Hex-Editor (Solutions)
Resources
Required Files
File Metadata Lab
File Metadata Lab solutions
Time Zones Conversion - Slides
Timezone and Timezone Conversion
Introduction
Converting Times
Converting Dates
Lab #1 - Timezone Conversion
Lab #1 - Timezone Conversion (Solutions)
Check Your Knowledge
Resources
What is the Forensics Report ?
Preparing For Forensics Report
The Importance of the Forensics Report
Why Documenting is Important?
Forensics Report Sections
Reporting Standards And Guidelines
Report Template
Before Writing the Forensics Report
Hard Disk
Required Files (Disk Analysis)
Disks Layout - MBR - Slides
Lab #1 - Working with MBR Partitions
Lab #1 - Working with MBR Partitions (Solution using 010 Editor)
Lab #1 - Working with MBR Partitions (Solution using WinHex)
Disks Layout - GPT - Slides
Lab #2 - Working with GPT Partitions
Lab #2 - Working with GPT Partitions (Solution)
Disks Layout - Extended MBR - Slides
Lab #3 - Working with Extended Disk Partitions
Required Files (Fixing Corrupted Disks)
Attaching VHDs to Your System
Lab #4 - Fixing Corrupted Disks (MBR Disk)
Lab #4 - Fixing Corrupted Disks (MBR Disk Solution)
Lab #5 - Fixing Corrupted Disks (GPT Disk)
Lab #5 - Fixing Corrupted Disks (GPT Disk Solution)
Lab #6 - Fixing GPT Disk Drives
Lab #6a - Fixing Corrupted GPT Drive - Case #1
FREE PREVIEWLab #6b - Fixing Corrupted GPT Drive - Case #2
FREE PREVIEWLab #6c - Fixing Corrupted GPT Drive - Case #3
FREE PREVIEWLab #7 - Fixing MBR Disk Drives
Lab #7a - Fixing Corrupted MBR Drive - Case #1
FREE PREVIEWResources - Extra Reading
What is File System
Required Files (FAT Analysis)
FAT File System - Basics - Slides
Intro to FAT File System
Lab #1 - Analyzing FAT Structure
FAT File System - Directory Entry - Slides
FAT File System - Timestamps - Slides
Lab #2 - Analyzing FAT File System
Lab #2 - Analyzing FAT File System (Solution)
Lab #3 - Analyzing FAT File System
Lab #3 - Analyzing FAT File System (Solution using 010 Editor)
Lab #3 - Analyzing FAT File System (Solution using WinHex)
NTFS
Required Files (NTFS Analysis)
NTFS Basics - Slides
NTFS MFT - Slides
Lab #6 - Analyzing the MFT File
Lab #6 - Analyzing the MFT File (Solution)
Lab #7 - Analyzing the MFT File
Lab #8 - Working with Data Attributes
Lab #8 - Working with Data Attributes (Solution)
MFT Slack Space
NTFS Dataruns and Fragmented Files
NTFS Fixups - Slides
Lab #9 - Working with Links
Lab #9 - Working with Links using MFT Browser (Solution)
Lab #9 - Working with Links using MFTECmd (Solution)
NTFS Journaling - Slides
Lab #10 - Working with UsnJrnl
NTFS INDX Buffers - Slides
Lab #11 - Working with Journals and Indexes
Lab #12 - NTFS Challenge
Lab #12 - NTFS Challenge (Solution A)
Lab #12 - NTFS Challenge (Solution B)
Ext4
NTFS vs EXT4
Timestamps and File Operations
Required Files
Lab #13 - Inspecting Timestamps
Quick Intro to .ad1 Files
Howto Load .ad1 Images using FTK Imager
Lab #13 - Inspecting Timestamps (Solution)
Lab #14 - Simple UsnJrnl Analysis
Lab #14 - Parsing UsnJrnl and Creating a Body File (Solution)
Lab #14 - UsnJrnl Analysis (Solution)
Lab #14 - Quick Timeline Overview (Solution)
Extra Reading Resources
Required Files
Introduction to File Carving - Slides
Introduction to Data Carving
Manual Data Carving - Using Hex Editor
Manual Data Carving - Carving an Image from a Doc File
Automatic Data Carving - Photorec
Automatic Data Carving - Foremost
Required Files
Lab #1 - Manual File Carving
Lab #1 - Manual File Carving (Solution)
Lab #2 - File Carving using PhotoRec
Lab #2 - File Carving using PhotoRec (Solution)
Lab #3 - File Carving using Foremost
Lab #3 - File Carving using Foremost (Solution)
Extra Reading Resources
Windows Basics - Slides
Windows Basics
Recycle Bin
Tools Requirements
File Formats
Check Your Knowledge #1
Lab #1 - Hands-on
Lab #1 - Hands-on (Solution)
Using Recycle Bin Tools
Recovering Permanently Deleted Files
Required Files
Lab #2 - Recycle Bin
Lab #2 - Recycle Bin (Solution)
Lab #2 - Parsing Recycle Bin Artifacts using RBCmd (Solution)
Thumbnail Caches - Slides
Thumbnail Caches - Intro
Howto Fix the Windows.edb Database
Required Files
Lab #3 - Thumbnails
Lab #3 - Thumbnails (Solution)
Lab #4 - Thumbnails
Lab #4 - Thumbnails (Solution)
Lab #5 - Thumbnails Case Study (self-study)
Lab #5 - Thumbnails Case Study (Solution)
Lab #5 - Thumbnails Case Study (Solution)
LNK Files - Slides
LNK Files - Intro
Required Files
Lab #1 - LNK Files
Lab #1 - LNK Files (Solution)
Lab #2 - LNK Files
Lab #2 - LNK Files (Solution)
Lab #3 - LNK Files
Lab #3 - LNK Files (Solution)
LNK Files, Zone Identifiers, and New Findings
JumpList - Slides
Jump Lists
Required Files
Lab #4 - Jump Lists
Lab #4 - Jump Lists (Solution)
Extra Reading
Welcome to "Investigating Windows Program Executions"!
Prefetch - Slides
Intro. to Prefetch Files
Analyzing Prefetch Files
PECmd
WinPrefetchView
Lab #1 - Prefetch
Lab #1 - Prefetch (Solution)
Intro. to AmCache
Analyzing AmCache
Analyzing with Registry Explorer
Analyzing with AmCacheParser
Lab #2 - AmCache
Lab #2 - AmCache (Solution)
Intro. to AppCompatCache (Shimcache)
Analyzing with AppCompatCacheParser
Analyzing using RegRipper
Lab #3 - AppCompatCache (Shimcache)
Lab #3 - AppCompatCache (Solution)
Intro. to UserAssist
Analyzing UserAssist
Lab #4 - UserAssist
Lab #4 - UserAssist (Solution)
Intro. to Background Activity Moderator (BAM)
Analyzing BAM
Analyzing SRUM using Chainsaw
Extra Reading
Required Files
Welcome to Windows Registry
Windows Registry - Slides 1
Windows Registry - Slides 2
The Structure of Windows Registry
Check Your Knowledge #1
Extract Hives through Command Line - Live System
Extract Hives through Registry Editor - Live System
Extract Hives through FTK Imager - Live System
Extract Hives through FTK Imager - Disk Image
Registry Explorer
RegRipper
Using the RegRipper GUI
RegRipper Command Line Tool
Autoruns
Download and Live System Analysis
Saved Hive / Offline Analysis
Investigating Windows Registry Hives: System Artifacts
Basic System Information
Basic System Information - Cont..
Check Your Knowledge #2
TimeZone
Check Your Knowledge #3
User Information
Security Identifier (SID)
Login Information
Internet Network Information
Check Your Knowledge #4
AppCompatCache or ShimCache
Other System Information
Malware
Lab #1 - Windows Registry
Lab #1 - Windows Registry (Solution)
Windows Registry User Artifacts Introduction
NTUSER.DAT and USRCLASS.DAT File Extraction
View Files Through RegEdit – Live System
Extract Files Through RegEdit – Live System
Extract Files Through FTK Imager – Live System
Extract Files Through FTK Imager – Disk Image
Last Write Timestamps
Check Your Knowledge #5
Application Usage - Part 1
Application Usage - Part 2
Application Usage - Part 3
Application Usage - Part 4
Check Your Knowledge #6
Internet Browsing
Search Queries
Other Artifacts
Check Your Knowledge #7
Check Your Knowledge #8
Lab #2 - Windows Registry
Lab #2 - Windows Registry (Solutions)
Parsing Windows Registry Run Keys using RegRipper
The Windows Registry Run Key Mystery
Extra Reading
USB Artifacts - Slides
Introduction to USB Forensics
How USBS Work
USB Registry Artifacts
USB Basic Information
Mounted Devices
MountPoints
Volume Serial Number
USB Timestamps
Check Your Knowledge #1
RegRipper USB Plugin
Use Case: USB Artifacts in Windows Registry
Introduction to USB Artifacts in Shellbags
Use Case: USB Artifacts in Windows Shellbags
USB Windows Event Viewer Artifacts
Using Windows Event Viewer
Extracting Logs from a Disk Image
USB Artifacts in the Setupapi.dev.log File
Parsing the Setupapi Log
Other USB Analysis Tools
Installing & Using USB Detective
NirSoft USBDeview
USB Artifacts Cheat Sheet
Check Your Knowledge #2
Lab #1 - USB Forensics
Lab #1 - USB Forensics (Solution)
Extra Reading
ShellBags - Slides
Introduction to Shellbags
Forensic Importance of Shellbags
Check your Knowledge #1
Shellbags Explorer - GUI
Shellbags Explorer – Command-line
ShellBagsView
RegRipper
Decoding Shellbag Artifacts
BagMRU
Bags
LastWrite Timestamp
LastWrite Timestamps Caveat
Required Files
Check Your Knowledge #2
Lab #1 - Windows Shellbags
Lab #1 - Windows Shellbags (Solutions)
Conclusion
Volume Shadow Copy - Slides
Volume Shadow Copies
Introduction
How VSS Works
Forensic Importance
Managing Volume Shadow Copies
Volume Shadow Copy Registry Management
VssAdmin
Check your Knowledge #1
Accessing Live Volume Shadow Copies
Shadow Explorer
Extracting Files From A Volume Shadow Copy
Extracting Files From A Volume Shadow Copy - Exercise
Investigating VSC Registries
Accessing Forensic Image Volume Shadow Copies
Arsenal Image Mounter
VSCMount
VSC Binary Format
Catalog
Store
Check your Knowledge #2
Conclusion
Required Files
Lab #1 - Investigating Volume Shadow Copies
Lab #2 - More Volume Shadow Copy
Using VSC Toolset with RegRipper
References
Further Reading
Windows Event Logs - Slides
Windows Event Viewer Forensics
Navigating Windows Event Viewer
Searching For Events
Types of Events
Enabling Logs & Changing Log Settings
Enable Auditing Through Group Policy
Enable Logging through Event Viewer
Event Log Settings
Extracting and Importing Event Logs
Extracting an Event Log from a Disk Image
Importing an Event Log File
Check Your Knowledge #1
Event Logs Artifacts
System Log
Security Log #1
Security Log #2
Security Logs #3
Security Logs #4
Security Logs #5
Security Logs #6
Security Logs #7
Check your Knowledge #2
Application Log
Applications & Services Log #1
Applications & Services Log #2
Other Tools: Event Log Parser
Required Files
Lab #1 - Investigating Windows Events
Lab #1 - Investigating Windows Events (Solution)
Lab #2
Lab #2 - Solutions
Lab #3
Lab #3 - Solutions
Conclusion
References
Extra Reading Resources
Scheduled Tasks - Slides
Introduction to Scheduled Task
File Format
Scheduled Task Tools
Required Files
Lab #1 - Scheduled Tasks
Lab #1 - Scheduled Tasks (Solution)
Scheduled Tasks and GhostTask Investigations
Extra Reading Resources
Search Artifacts - Slides
Fixing Windows.edb
Loading a Dirty vs Clean Windows.edb
Extra Reading Resources
Required Files
Lab #1 - Working with Autopsy
Lab #1 - Working with Autopsy (Solution)
Extra Reading Resources
Required Files
The Joker
Kroll Artifact Parser and Extractor or KAPE
Intro to KAPE
Where to use KAPE?
KAPE Targets
KAPE Targets (Acquiring Evidence)
KAPE Modules
KAPE Modules (Processing Acquired Evidence)
CCDFA Exam
Required Skills
Howto Start the Exam?
FAQ
Before You Go (End of the Course)
Books, Papers, and other Resources
Important: Learners should have experience installing software and working with virtual machines using a hypervisor. Please ensure you are comfortable setting up and managing virtual environments independently before starting the course.
Unlock the skills needed to identify, investigate, and understand digital incidents in a hands-on, guided environment. This training bridges the gap between theory and practice by walking you through real-world case scenarios, forensic imaging, artifact analysis, timeline reconstruction, and report writing.
Whether you're pursuing a career in digital forensics, incident response, or security operations, this course provides the core foundation and investigative techniques required to uncover evidence, trace attacker activity, and respond effectively in today's evolving threat landscape.
1. A computer with internet access and a modern web browser.
2. Access to the
Cyber 5W Virtual Lab Environment
3. Please create a lab account using the same email address as your course enrollment and inform us once completed.
⭐ Real feedback from learners who’ve taken the C5W Digital Forensics Analyst Exam ⭐
Although this exam had its challenges, I thoroughly enjoyed the process and I recommend Ali and Jessica for continuing to challenge me even after 15 years of forensics work.
This test is different than most where it's not multiple choice questions but rather a complete practical examination of a predefined set of evidence. Your final report of your findings is then graded with a 70% required to pass.
It has been a game-changer for me during this exam, and I would encourage everyone to take the course and start the #dfir journey.
How do I purchase a course?
You can enroll in any course directly through our platform using secure online payment via Stripe.
How do I access my course after enrollment?
Once payment is complete, you will be redirected to the course and receive a confirmation email. You may also log in at any time to access your content via the My Dashboard section.
How long will I have access to the course material?
Lifetime access while the course remains available, with a guaranteed minimum of 1 year, even if it is updated or retired.
What are the general technical requirements?
Our platform is accessible from any device with internet access. For hands-on labs, we recommend:
Alternatively, we offer fully hosted Virtual Labs that allow you to complete technical exercises via the cloud. Please check our labs at: labs.cyber5w.com.
Can I ask for help if I don't understand something?
Of course! Reach out by email anytime.
What is the expected time commitment for each course?
Each course is self-paced and designed to accommodate different learning speeds. The time you'll need depends on your current knowledge, experience, and how deeply you choose to engage with the materials and hands-on labs.
Do you offer student discounts?
Yes, we offer a 25% discount to verified university or college students (must register with a valid academic email). Please contact us at [email protected] after registering and before purchasing.
Do you offer law enforcement and military professionals discounts?
Yes, we offer a 25% discount to active law enforcement and military professionals (official verification required). Please contact us at [email protected] after registering and before purchasing.
Do you offer corporate training or customized training solutions?
Absolutely. We provide customized training solutions for teams, security operations centers, and government entities, including on-site workshops, simulations, and private lab access. Please contact us at [email protected] for arrangement.
Do your courses include Certificate of Completion?
All of our courses include a Certificate of Completion, awarded upon successful completion of lessons, labs, or a final exam (where applicable). These certificates are designed to support your professional development in the DFIR and cybersecurity fields.
Do you deliver on-site training for employees?
Yes, we tailor on-site training programs to your team's specific needs. Please contact us to discuss options, dates, and pricing.
Do you travel internationally?
Yes. Our instructors can deliver on-site training globally. Travel expenses will apply.
How long are your on-site training sessions?
Courses can range from one-day workshops to multi-week immersive programs, depending on your goals.
Can we customize the syllabus?
Absolutely! We work with you to design a tailored syllabus that matches your team's skill level and focus areas.
Do you provide virtual lab access?
Yes, all labs are accessible at labs.cyber5w.com.
What if my computer isn't good enough for the labs?
No worries, you can complete all exercises in our prebuilt virtual lab environment. No special hardware is needed, only a modern web browser to access the online labs.
What software or tools are installed in the virtual labs?
Each lab comes preloaded with the tools you'll need to successfully complete the exercises in the course you are learning.
How long do I have access to the labs?
Your virtual lab access comes with a predefined set of hours, but you can extend the lab access time as preferred (optional).
What professional certifications can I earn?
Cyber5W offers a series of hands-on, industry-recognized certifications to validate your expertise in digital forensics and threat analysis. These certifications are available as optional exams after completing the relevant training.
Note: Detailed exam requirements, structure, and registration links are available on each certification's dedicated page. Each exam comes with 1 retake.
I'm new to DFIR, which professional certifications are available for beginners?
Note: DetailedDetailed exam requirements, structure, and registration links are available on each certification's dedicated page.
Can I retake a test if I do not pass the exam?
Yes, we allow multiple retake attempts. Check your exam specifics or contact support if you need further help.
What support is available during an exam?
You may email [email protected] for logistics and technical issues, but no exam-specific assistance will be provided.
How are CYBER 5W certification exams different from traditional tests?
At CYBER 5W, our certification exams are skill-based, not just multiple-choice. We assess your practical knowledge through real-world tasks to ensure you can apply what you've learned.
Can't find the answer you're looking for? Please chat to our friendly team.
Get in touchSign up for the latest findings, field advancements, and updates on upcoming webinars, conferences, seminars, and free courses.