The number of incidents being reported is rapidly increasing every year. Organizations need to respond to these incidents and investigate what, when, why, where, who, and how they happened. This requires special skills and knowledge in systems and how they operate. This is not a simple task that can be handled by an IT professional, but only those trained to acquire and analyze information in a forensically sound manner.
Cyber 5W Digital Forensic Analyst training will guide students on how to conduct digital investigations and write investigative forensic reports. This training uses an experiential learning process for training students, where students learn digital forensics by doing investigative tasks on real-world cases. Students will learn how to perform evidence acquisition and how to deal with disks and file systems, and then explore the forensic artifacts one may encounter when working with the Windows operating system. By completing this training, students are prepared to take the exam that leads to the Cyber 5W Certified Digital Forensic Analyst (CCDFA) certificate.
The full course contents has been published and new extra content is being added.
Live Training: Instructor (40 hour) | Materials | Certification Exam
All sessions starts from 9 AM to 2 PM (Eastern Time) or upon a mutual agreement
Introduction to Digital Forensics
- Evidence and Evidence Acquisition
- Hashing and Validation
- Mounting Your Evidence
- File Analysis: Hexeditors, Signatures, Extension
- Time Zones and Dates (Timestamps)
- Autopsy and other Tools
- Writing a Report
Working with Disks, Volumes, and File Systems
- Disk Analysis (MBR & GPT)
- Fixing Corrupted Disks
- Analyzing File Systems (FAT32 & NTFS)
- Data and File Carving
Windows Forensic Analysis
- Windows Basics: User SID + Recycle Bin, Thumbnails
- LNK Files and Jump Lists
- System and User Program Execution
- Windows Registry
- Investigating USB Thumb Drives
- Analyzing Shellbags
- Volume Shadow Copies & File History
- Windows Events
- Windows Scheduled Tasks
Ali Hadi is a Senior Cybersecurity Specialist with 15+ years of industrial experience in Information Technology (IT), currently working as a full-time professor and researcher for both the Computer and Digital Forensics and Cybersecurity Departments at Champlain College, USA. Ali is also a Co-Founder and the Chief Technology Officer at Cyber 5W. Ali provides consulting in several areas of security including digital forensics and incident response, cyber threat hunting, and penetration testing. Ali is also an author, speaker, and freelance instructor where he delivered technical training to law enforcement agencies, banks, telecoms, private companies, and other institutes. Ali's research interests include digital forensics, incident response, adversary emulation, and offensive security. More details could be found here or contact him directly through twitter here.
Understand the fundamentals of digital forensic investigations
Demonstrate correct methods of evidence gathering
Learn how to extract file metadata and analyze files using a hex-editor
Summarize the analysis results and write investigative reports
Ability to analyze and fix corrupted disks
Ability to analyze FAT32 and NTFS file systems, plus recover and carve files from raw data
Ability to investigate Windows System Artifacts
Investigating Windows Program Execution Artifacts
Investigating Windows Registry and Windows Shellbags
Ability to analyze Windows Events Logs, Scheduled Tasks, and different Windows Applications (e.g. Skype, One Drive, etc)
This course assumes no previous knowledge in digital forensics, however basic knowledge in computer science or any related field is highly desirable.
Anyone who wants to start a career in digital forensics, SOC team members, incident response handlers, red team members, malware analysts, and anyone who is curious to know about digital forensics and wants to learn something new.
1. Computer or laptop with a Linux/Windows/Mac Operating System.
2. Capability of running virtualization software such as VMWare or VirtualBox.
3. More than 100 GB of disk space for the Virtual Machines and Forensic Images used.
Full refunds will be provided up to 14 days before the course start date. You are allowed to change the course schedule up to 10 days before the course starts.