Step into the role of a digital forensics investigator in this advanced workshop. In this real-world simulation, you’ll analyze a system compromised through a phishing attack, where the threat actor may have used TeamViewer and other methods to maintain persistent access.

This workshop challenges you to investigate the attacker’s initial access, trace signs of persistence, and examine system logs, services, and remote access tools. Participants will work through structured Windows tasks, with optional Linux-based exploration for those who have extra time.

Designed for intermediate to advanced learners, this lab emphasizes real investigative workflows, including mounting evidence, extracting key artifacts, and piecing together attacker activity through logs and behavior patterns.

Purchasing this workshop provides 5 hours of access to a pre-configured virtual machine and forensic dataset to reinforce hands-on skills.

Frequently asked questions

  • How do I purchase a course?

    You can enroll in any course directly through our platform using secure online payment via Stripe.

  • How do I access my course after enrollment?

    Once payment is complete, you will be redirected to the course and receive a confirmation email. You may also log in at any time to access your content via the My Dashboard section.

  • How long will I have access to the course material?

    Lifetime access while the course remains available, with a guaranteed minimum of 1 year, even if it is updated or retired.

  • What are the general technical requirements?

    Our platform is accessible from any device with internet access. For hands-on labs, we recommend:

    • A modern operating system capable of running virtual machines
    • 8 GB RAM (minimum)
    • 500 GB disk space
    • Hypervisor software: Virtualbox, VMWare, HyperV, etc


    Alternatively, we offer fully hosted Virtual Labs that allow you to complete technical exercises via the cloud. Please check our labs at: labs.cyber5w.com.


  • Can I ask for help if I don't understand something?

    Of course! Reach out by email anytime.

  • What is the expected time commitment for each course?

    Each course is self-paced and designed to accommodate different learning speeds. The time you'll need depends on your current knowledge, experience, and how deeply you choose to engage with the materials and hands-on labs.

  • Do you offer student discounts?

    Yes, we offer a 25% discount to verified university or college students (must register with a valid academic email). Please contact us at [email protected] after registering and before purchasing.

  • Do you offer law enforcement and military professionals discounts?

    Yes, we offer a 25% discount to active law enforcement and military professionals (official verification required). Please contact us at [email protected] after registering and before purchasing.

  • Do you offer corporate training or customized training solutions?

    Absolutely. We provide customized training solutions for teams, security operations centers, and government entities, including on-site workshops, simulations, and private lab access. Please contact us at [email protected] for arrangement.

  • Do your courses include Certificate of Completion?

    All of our courses include a Certificate of Completion, awarded upon successful completion of lessons, labs, or a final exam (where applicable). These certificates are designed to support your professional development in the DFIR and cybersecurity fields.

Still have questions?

Can't find the answer you're looking for? Please chat to our friendly team.

Get in touch

Stay ahead in DFIR!

Sign up for the latest findings, field advancements, and updates on upcoming webinars, conferences, seminars, and free courses.

Get updates!

Thank You