Without Vouchers
Showing all 8 results
-
X-Ways Forensics (4d)
This 4-days course include: This course is focused on the systematic and efficient examination of computer media using our integrated computer forensics software “X-Ways Forensics”. Complete and systematic coverage of all computer forensics features in WinHex and X-Ways Forensics. Hands-on exercises, simulating most aspects of the complete computer forensics process. Attendees are encouraged to […]
-
CCE BootCamp (5d)
CCE BootCamp V6! This is the Official CCE BootCamp® that will teach you what you need to know to successfully take the Certified Computer Examiner (CCE)® certification examination. The Certified Computer Examiner (CCE)® BootCamp is an intensive one week training course in computer forensic examinations. This course will teach you how to conduct forensically sound […]
-
T1 DFIR Foundations (3d)
DFIR is a three day course Cyberattacks have become a common aspect of our interconnected world. In the past, a response to such incidents would be to simply kick the attacker off and rebuild any compromised computers. But with the proliferation of skilled people employing ever more complex attack vectors, there is a call to […]
-
Advanced File Systems (4d)
File Systems Forensics & Data Structures What do we need to know? (Signed and Unsigned Integers, Bit assignment, Time representations (DOS32, Win64,Unix/C). Introduction to the concept of file system References to data Metadata of the referenced data Introduction to the concept of a file (What constitutes a file?) Recognising the Reference, the metadata and the […]
Price -
SOC-Class (4d)
SOC Class- Four Day Training – By Christopher Crowley This course provides a comprehensive picture of a Cyber Security Operations Center (CSOC or SOC). Discussion on the technology needed to run a SOC are handled in a vendor agnostic way. In addition, technology is addressed in a way that attempts to address both minimal budgets as well […]
-
Linux Forensics (4d)
Linux Forensics By Hal Pomeranz Linux is everywhere– running in the cloud, on cell phones, and in embedded devices that make up the “Internet of Things”. Often neglected by their owners, vulnerable Linux systems are low-hanging fruit for attackers wishing to create powerful botnets or mine cryptocurrencies. Ransomware type attacks may target Linux-based database systems […]
-
Digital Forensics & Data Analysis (4d)
Digital Forensics & Data Analysis 101 (4-DAY INSTRUCTOR LED COURSE) COURSE SUMMARY Learn about Digital Forensics and develop a thorough understanding of how to collect and analyse digital evidence effectively. Learn how to navigate the complexities of digital evidence sources, including computers, smartphones, and cloud platforms, and gain hands-on experience with the latest forensic […]
-
My Hard Drive Died (5d)
NOTE: You must sign up and pay at least 30 DAYS before any class to reserve your seat! If you want a seat make sure you do it earlier rather than later. This is a mentored 5-day Data Recovery Expert Certification Class where I, Scott Moulton, will be there to walk you though everything […]