Course Curriculum

  • 01

    Introduction

    • Introduction to Anti-Forensics

  • 02

    Data Hiding

    • Data Hiding Techniques

  • 03

    Stenography

    • Stego Techniques

  • 04

    Crypto

    • Modern Crypto Techniques

  • 05

    File Systems

    • File System Anti-Forensic Techniques

  • 06

    Operating System & Memory

    • OS and Memory Anti-Forensics

  • 07

    Network

    • Network Anti-Forensics Techniques

  • 08

    Resources

    • Extra Reading

Get started now

Learn the different anti-forensic techniques that you might encounter during investigations

Learning Outcomes

After completing this course, you will learn the following.

  • Analyze the various anti-forensics techniques and processes that could be used to conceal and obscure digital evidence, such as data hiding, steganography, and encryption

  • Examine how anti-forensics techniques can be used to undermine the accuracy and reliability of digital evidence

  • Explore the defensive measures that can be employed to detect and uncover hidden data

  • Investigate the various cryptography and steganography techniques that are currently being used to conceal data and information in the wild

Technical Requirements

To complete the hands-on labs

  • Windows 10/11 and a Linux operating systems

  • Internet Connection

  • 010 Editor here or HxD Editor here

  • X-Ways here or at least WinHex here

  • Others

What is next at Cyber 5W?

Add your email to the mailing list to get the latest updates.