Course Curriculum

  • 01


    • Introduction to Anti-Forensics

  • 02

    Data Hiding

    • Data Hiding Techniques

  • 03


    • Stego Techniques

  • 04


    • Modern Crypto Techniques

  • 05

    File Systems

    • File System Anti-Forensic Techniques

  • 06

    Operating System & Memory

    • OS and Memory Anti-Forensics

  • 07


    • Network Anti-Forensics Techniques

  • 08


    • Extra Reading

Get started now

Learn the different anti-forensic techniques that you might encounter during investigations

Learning Outcomes

After completing this course, you will learn the following.

  • Analyze the various anti-forensics techniques and processes that could be used to conceal and obscure digital evidence, such as data hiding, steganography, and encryption

  • Examine how anti-forensics techniques can be used to undermine the accuracy and reliability of digital evidence

  • Explore the defensive measures that can be employed to detect and uncover hidden data

  • Investigate the various cryptography and steganography techniques that are currently being used to conceal data and information in the wild

Technical Requirements

To complete the hands-on labs

  • Windows 10/11 and a Linux operating systems

  • Internet Connection

  • 010 Editor here or HxD Editor here

  • X-Ways here or at least WinHex here

  • Others

What is next at Cyber 5W?

Add your email to the mailing list to get the latest updates.