This course teaches you how to acquire a disk image from a Linux device. The course will also teach you how to format and mount disks in Linux, how to deal with E01 images, how to use bootable media, and how to perform remote acquisition.
The Evidence Acquisition Under Linux course is a focused, hands-on module crafted to teach forensic professionals how to properly acquire data from Linux systems in a defensible and forensically sound manner. You will learn how to image disks, handle E01 evidence formats, format and mount drives in Linux, perform remote acquisitions, and work effectively with boot-media and live systems.
Throughout the training, you’ll engage in practical exercises that mirror real-world scenarios, recovering evidence from Linux devices and preparing it for further forensic analysis. Whether you’re working in law enforcement, corporate investigations, or incident response, this course provides essential skills for handling Linux evidence confidently.
Self-Paced Learning: Access course materials anytime and progress at your own pace.
Hands-On Exercises: Practice Linux disk acquisition, imaging, and mounting techniques through guided labs.
Virtual Lab Access: Optional enrollment includes virtual lab access for practicing Linux acquisition and forensic workflows. Visit our
Virtual Lab Environment
Technical Requirements: A workstation with at least 16GB RAM, 100GB disk space, and a stable internet connection is required for lab activities.
Welcome & Lab Access
Introduction
DD Command
Evidence Acquisition
Imaging Disks Using DD
Disk Wiping And Initialization
E01 Images
Tool#1 ewfverify
Tool #2 Ewfacquire
Tool #3 Ewfinfo
Create a Bootable USB Drive Using DDRESCUE Tool
Using NETCAT to Copy Forensic Images
Using Netcat In One Machine
Using Netcat Between Two Machines - Linux
Using Netcat Between Two Machines - Windows
Disk Unmounting
Exercise Guide
Exercise 1.1
Exercise 1.1 - Solution
Exercise 1.2
Exercise 1.2 - Solution
Exercise 1.3
Exercise 1.3 - Solution
Exercise 1.4
Exercise 1.4 - Solution
Identify appropriate methods for acquiring data from Linux systems (live and static)
Image disks and partitions, including E01 format handling
Format, mount, and analyze Linux file systems for acquisition readiness
Perform remote evidence collection from Linux hosts using secure methods
Ensure forensic integrity and chain of custody when working in Linux environments
About this course
$50.00
25 lessons
Frequently asked questions
How do I purchase a course?
You can enroll in any course directly through our platform using secure online payment.
How do I access my course after enrollment?
Once payment is complete, you will be redirected to the course and receive a confirmation email. You may also log in at any time to access your content via the My Dashboard section.
How long will I have access to the course material?
Lifetime access while the course remains available, with a guaranteed minimum of 1 year, even if it is updated or retired.
What are the general technical requirements?
Our platform is accessible from any device with internet access. For hands-on labs, we recommend:
A modern operating system capable of running virtual machines
Alternatively, we offer fully hosted Virtual Labs that allow you to complete technical exercises via the cloud. Please check our labs at: labs.cyber5w.com.
Can I ask for help if I don't understand something?
Of course! Reach out by email anytime.
What is the expected time commitment for each course?
Each course is self-paced and designed to accommodate different learning speeds. The time you'll need depends on your current knowledge, experience, and how deeply you choose to engage with the materials and hands-on labs.
Do you offer student discounts?
Yes, we offer a 25% discount to verified university or college students (must register with a valid academic email). Please contact us at [email protected] after registering and before purchasing.
Do you offer law enforcement and military professionals discounts?
Yes, we offer a 25% discount to active law enforcement and military professionals (official verification required). Please contact us at [email protected] after registering and before purchasing.
Do you offer corporate training or customized training solutions?
Absolutely. We provide customized training solutions for teams, security operations centers, and government entities, including on-site workshops, simulations, and private lab access. Please contact us at [email protected] for arrangement.
Do your courses include Certificate of Completion?
All of our courses include a Certificate of Completion, awarded upon successful completion of lessons, labs, or a final exam (where applicable). These certificates are designed to support your professional development in the DFIR and cybersecurity fields.
Do you deliver on-site training for employees?
Yes, we tailor on-site training programs to your team's specific needs. Please contact us to discuss options, dates, and pricing.
Do you travel internationally?
Yes. Our instructors can deliver on-site training globally. Travel expenses will apply.
How long are your on-site training sessions?
Courses can range from one-day workshops to multi-week immersive programs, depending on your goals.
Can we customize the syllabus?
Absolutely! We work with you to design a tailored syllabus that matches your team's skill level and focus areas.
What if my computer isn't good enough for the labs?
No worries, you can complete all exercises in our prebuilt virtual lab environment. No special hardware is needed, only a modern web browser to access the online labs.
What software or tools are installed in the virtual labs?
Each lab comes preloaded with the tools you'll need to successfully complete the exercises in the course you are learning.
How long do I have access to the labs?
Your virtual lab access comes with a predefined set of hours, but you can extend the lab access time as preferred (optional).
What professional certifications can I earn?
Cyber5W offers a series of hands-on, industry-recognized certifications to validate your expertise in digital forensics and threat analysis. These certifications are available as optional exams after completing the relevant training.
Cyber 5W Certified Digital Forensic Analyst (CCDFA)
Cyber 5W Certified Linux Forensic Analyst (CCLFA)
Cyber 5W Certified Malware Analyst (CCMA)
Cyber 5W Certified Threat Analyst (CCTA)
Note: Detailed exam requirements, structure, and registration links are available on each certification's dedicated page. Each exam comes with 1 retake.
I'm new to DFIR, which professional certifications are available for beginners?
Cyber 5W Certified Digital Forensics Evidence Handler
Cyber 5W Certified Digital Forensics Foundations)
Note: DetailedDetailed exam requirements, structure, and registration links are available on each certification's dedicated page.
Can I retake a test if I do not pass the exam?
Yes, we allow multiple retake attempts. Check your exam specifics or contact support if you need further help.
What support is available during an exam?
You may email [email protected] for logistics and technical issues, but no exam-specific assistance will be provided.
How are CYBER 5W certification exams different from traditional tests?
At CYBER 5W, our certification exams are skill-based, not just multiple-choice. We assess your practical knowledge through real-world tasks to ensure you can apply what you've learned.
Still have questions?
Can't find the answer you're looking for? Please chat to our friendly team.