Step into the role of a digital forensics investigator in this advanced workshop. In this real-world simulation, you will analyze a system compromised through a phishing attack, where the threat actor may have used TeamViewer and other techniques to maintain persistent access.

This workshop challenges you to investigate the attacker’s initial access, trace persistence mechanisms, and examine system logs, services, and remote access tools. Participants will follow structured Windows tasks, with optional Linux-based exercises for those with extra time.

Designed for intermediate to advanced learners, this lab emphasizes authentic investigative workflows, including mounting evidence, extracting critical artifacts, and reconstructing attacker activity through logs and behavioral patterns.

Enrolling in this workshop provides 5 hours of access to a pre-configured virtual machine and forensic dataset, allowing you to reinforce your hands-on skills in a controlled environment.

Frequently asked questions

  • How do I purchase a course?

    You can enroll in any course directly through our platform using secure online payment.

  • How do I access my course after enrollment?

    Once payment is complete, you will be redirected to the course and receive a confirmation email. You may also log in at any time to access your content via the My Dashboard section.

  • How long will I have access to the course material?

    Lifetime access while the course remains available, with a guaranteed minimum of 1 year, even if it is updated or retired.

  • What are the general technical requirements?

    Our platform is accessible from any device with internet access. For hands-on labs, we recommend:

    • A modern operating system capable of running virtual machines
    • 8 GB RAM (minimum)
    • 500 GB disk space
    • Hypervisor software: Virtualbox, VMWare, HyperV, etc


    Alternatively, we offer fully hosted Virtual Labs that allow you to complete technical exercises via the cloud. Please check our labs at: labs.cyber5w.com.


  • Can I ask for help if I don't understand something?

    Of course! Reach out by email anytime.

  • What is the expected time commitment for each course?

    Each course is self-paced and designed to accommodate different learning speeds. The time you'll need depends on your current knowledge, experience, and how deeply you choose to engage with the materials and hands-on labs.

  • Do you offer student discounts?

    Yes, we offer a 25% discount to verified university or college students (must register with a valid academic email). Please contact us at [email protected] after registering and before purchasing.

  • Do you offer law enforcement and military professionals discounts?

    Yes, we offer a 25% discount to active law enforcement and military professionals (official verification required). Please contact us at [email protected] after registering and before purchasing.

  • Do you offer corporate training or customized training solutions?

    Absolutely. We provide customized training solutions for teams, security operations centers, and government entities, including on-site workshops, simulations, and private lab access. Please contact us at [email protected] for arrangement.

  • Do your courses include Certificate of Completion?

    All of our courses include a Certificate of Completion, awarded upon successful completion of lessons, labs, or a final exam (where applicable). These certificates are designed to support your professional development in the DFIR and cybersecurity fields.

Still have questions?

Can't find the answer you're looking for? Please chat to our friendly team.

Get in touch

Stay ahead in DFIR!

Sign up for the latest findings, field advancements, and updates on upcoming webinars, conferences, seminars, and free courses.

Get updates!

Thank You