Digital Investigations - Advanced Training Course
In this course, you will gain an understanding of the fundamental principles and methodologies behind digital forensics investigations, alongside a comprehensive overview of the various computer forensics tools available. The curriculum covers essential forensic procedures designed to ensure that evidence meets the standards for admissibility in court, as well as the associated legal and ethical considerations.
You will also learn how to conduct forensic investigations on both Unix/Linux and Windows environments utilizing diverse file systems, while exploring advanced topics such as investigations into wireless, network, web, database, and mobile-related crimes.
Course Outline
Upon completion of this course, you will be able to demonstrate knowledge and understanding of:
- The forensic investigation process
- The application of Encase and Access Data FTK guidance
- Forensic techniques for cryptography, steganography, and media files
- Password cracking methods
- Investigation of wireless attacks
- Investigation of web application attacks
- Investigation of web server attacks
- Investigation of database server attacks
- Investigation of email-related crimes
- Investigation of mobile application crimes
Requirements
Professional experience in an IT or IT-related position
Completion of the course Digital Forensic Investigation - Introduction
Open Training Courses require 5+ participants.
Digital Investigations - Advanced Training Course - Booking
Digital Investigations - Advanced Training Course - Enquiry
Digital Investigations - Advanced - Consultancy Enquiry
Testimonials (2)
Clarity and pace of explanations
Federica Galeazzi - Aethra Telecomunications SRL
Course - AI-Powered Cybersecurity: Advanced Threat Detection & Response
It did give me the insight what I needed :) I am starting teaching on a BTEC Level 3 qualification and wanted to widen my knowledge in this area.
Otilia Pasareti - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
Upcoming Courses
Related Courses
AI-Powered Cybersecurity: Threat Detection & Response
21 HoursThis instructor-led, live training in Serbia (online or onsite) is designed for entry-level cybersecurity professionals eager to learn how to use AI to enhance their threat detection and response capabilities.
Upon completion of this training, participants will be able to:
- Grasp the applications of AI within cybersecurity.
- Deploy AI algorithms for effective threat detection.
- Automate incident response using AI tools.
- Integrate AI into current cybersecurity infrastructure.
AI-Powered Cybersecurity: Advanced Threat Detection & Response
28 HoursThis instructor-led, live training in Serbia (online or onsite) is designed for intermediate to advanced cybersecurity professionals seeking to enhance their skills in AI-driven threat detection and incident response.
Upon completion of this training, participants will be able to:
- Deploy advanced AI algorithms for real-time threat detection.
- Tailor AI models to address specific cybersecurity challenges.
- Create automation workflows for efficient threat response.
- Protect AI-driven security tools from adversarial attacks.
Blue Team Fundamentals: Security Operations and Analysis
21 HoursThis live, instructor-led training in Serbia (online or onsite) targets intermediate-level IT security professionals who wish to develop skills in security monitoring, analysis, and response.
By the end of this training, participants will be able to:
- Understand the role of a Blue Team in cybersecurity operations.
- Use SIEM tools for security monitoring and log analysis.
- Detect, analyze, and respond to security incidents.
- Perform network traffic analysis and threat intelligence gathering.
- Apply best practices in security operations center (SOC) workflows.
Bug Bounty Hunting
21 HoursBug bounty hunting involves systematically identifying security weaknesses in software, websites, or systems and responsibly disclosing them in exchange for rewards or professional recognition.
This instructor-led live training (available online or onsite) is designed for beginner-level security researchers, developers, and IT professionals eager to grasp the fundamentals of ethical bug hunting and actively participate in bug bounty programs.
Upon completing this training, participants will be equipped to:
- Grasp the fundamental principles of vulnerability discovery and the mechanics of bug bounty programs.
- Utilize essential tools such as Burp Suite and browser developer tools for application testing.
- Recognize prevalent web security flaws, including XSS, SQLi, and CSRF.
- Submit clear, actionable vulnerability reports to bug bounty platforms.
Training Format
- Interactive lectures and discussions.
- Practical application of bug bounty tools within simulated testing environments.
- Guided exercises focused on discovering, exploiting, and reporting vulnerabilities.
Customization Options
- For organizations seeking a customized training program tailored to their specific applications or testing requirements, please contact us to arrange a session.
Bug Bounty: Advanced Techniques and Automation
21 HoursBug Bounty: Advanced Techniques and Automation provides an in-depth exploration of high-impact vulnerabilities, automation frameworks, reconnaissance techniques, and the tooling strategies employed by top-tier bug bounty hunters.
This instructor-led, live training (available online or onsite) is designed for intermediate to advanced-level security researchers, penetration testers, and bug bounty hunters who aim to automate their workflows, scale their reconnaissance efforts, and uncover complex vulnerabilities across multiple targets.
Upon completion of this training, participants will be able to:
- Automate reconnaissance and scanning processes for multiple targets.
- Utilize cutting-edge tools and scripts essential for bounty automation.
- Identify complex, logic-based vulnerabilities that standard scans often miss.
- Develop custom workflows for subdomain enumeration, fuzzing, and reporting.
Course Format
- Interactive lectures and discussions.
- Hands-on practice with advanced tools and scripting for automation.
- Guided labs focusing on real-world bounty workflows and advanced attack chains.
Course Customization Options
- To request a customized training session tailored to your specific bounty targets, automation requirements, or internal security challenges, please contact us to arrange.
Cyber Defence (SOC) Analyst Foundation
7 HoursThis live, instructor-led training in Serbia (online or on-site) targets security analysts and system administrators at the beginner to intermediate level who wish to establish a foundational understanding of Cyber Defence (SOC) analysis.
By the end of this training, participants will be able to:
- Understand the principles of Security Management in a Cyber Defence context.
- Execute effective Incident Response strategies to mitigate security incidents.
- Implement Security Education practices to enhance organizational awareness and preparedness.
- Manage and analyze Security Information for proactive threat identification.
- Utilize Event Management techniques to monitor and respond to security events.
- Implement Vulnerability Management processes to identify and address system vulnerabilities.
- Develop skills in Threat Detection to identify and respond to potential cyber threats.
- Participate in Simulated Attacks to test and improve incident response capabilities.
CHFI - Certified Digital Forensics Examiner
35 HoursThe vendor-neutral Certified Digital Forensics Examiner certification is designed to equip Cyber Crime and Fraud Investigators with the skills for electronic discovery and advanced investigative techniques. This training is indispensable for anyone who encounters digital evidence during the course of an investigation.
The Certified Digital Forensics Examiner program instructs participants on the methodology for conducting computer forensic examinations. Students will master forensically sound investigative practices to assess scenes, collect and document pertinent data, interview key personnel, maintain the chain of custody, and draft comprehensive findings reports.
The Certified Digital Forensics Examiner course offers significant value to organizations, individuals, government entities, and law enforcement agencies seeking to pursue litigation, establish proof of guilt, or implement corrective actions based on digital evidence.
Certified Incident Handler
21 HoursThe Certified Incident Handler program offers a systematic methodology for effectively and efficiently managing cybersecurity incidents.
Delivered by instructors through live online or onsite sessions, this course is designed for IT security professionals with intermediate-level expertise who aim to acquire the tactical skills necessary to plan, classify, contain, and manage security incidents.
Upon completing this training, participants will be equipped to:
- Grasp the incident response lifecycle and its various phases.
- Carry out procedures for incident detection, classification, and notification.
- Implement containment, eradication, and recovery strategies with precision.
- Create comprehensive post-incident reports and continuous improvement plans.
Course Format
- Interactive lectures and discussions.
- Practical application of incident handling procedures within simulated environments.
- Instructor-led exercises targeting detection, containment, and response workflows.
Customization Options
- For a tailored training session aligned with your organization’s specific incident response protocols or tools, please reach out to us to make arrangements.
Mastering Continuous Threat Exposure Management (CTEM)
28 HoursThis instructor-led, live training in Serbia (online or onsite) is designed for intermediate-level cybersecurity professionals aiming to implement CTEM within their organizations.
Upon completing this training, participants will be equipped to:
- Comprehend the core principles and phases of CTEM.
- Identify and prioritize risks using CTEM methodologies.
- Integrate CTEM practices into existing security protocols.
- Leverage tools and technologies for continuous threat management.
- Develop strategies to continuously validate and enhance security measures.
Cyber Emergency Response Team (CERT)
7 HoursThis course explores the management of an incident response team. Given the frequency and complexity of modern cyber attacks, the role of the first responder and the function of incident response have become critical for organizations.
As the final line of defense, effective incident response depends on detecting and responding to events efficiently. This requires robust management processes, along with specialized skills and knowledge for managing an incident response team.
Cyber Threat Intelligence
35 HoursThis instructor-led, live training in Serbia (online or onsite) is tailored for advanced cybersecurity professionals who wish to comprehend Cyber Threat Intelligence and develop skills to effectively manage and mitigate cyber threats.
By the end of this training, participants will be able to:
- Understand the fundamentals of Cyber Threat Intelligence (CTI).
- Analyze the current cyber threat landscape.
- Collect and process intelligence data.
- Perform advanced threat analysis.
- Leverage Threat Intelligence Platforms (TIPs) and automate threat intelligence processes.
Fundamentals of Corporate Cyber Warfare
14 HoursThis instructor-led, live training in Serbia (online or onsite) covers the different aspects of enterprise security, from AI to database security. It also includes coverage of the latest tools, processes and mindset needed to protect from attacks.
Ethical Hacker
35 HoursThis course immerses participants in an interactive learning environment where they are taught how to scan, test, exploit, and secure their own systems. The lab-intensive setting provides each student with in-depth knowledge and practical experience with essential current security systems. Participants begin by understanding how perimeter defenses operate, then progress to scanning and attacking their own networks in a controlled environment where no real network is harmed. Students then learn how intruders escalate privileges and identify the steps necessary to secure a system. Additionally, students will gain insights into Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation. Upon completion of this intensive 5-day class, students will possess a hands-on understanding and practical experience in Ethical Hacking.
The purpose of the Ethical Hacking Training is to:
- Establish and govern minimum standards for credentialed professional information security specialists in ethical hacking measures.
- Inform the public that credentialed individuals meet or exceed these minimum standards.
- Reinforce ethical hacking as a unique and self-regulating profession.
Audience:
The course is ideal for professionals in roles such as, but not limited to:
- Security Engineers
- Security Consultants
- Security Managers
- IT Directors/Managers
- Security Auditors
- IT Systems Administrators
- IT Network Administrators
- Network Architects
- Developers
Certified Lead Ethical Hacker
35 HoursWhy should you attend?
The Certified Lead Ethical Hacker training program empowers you with the essential expertise to execute information system penetration tests by leveraging recognized principles, procedures, and techniques. This approach helps identify potential threats within computer networks. Throughout this course, you will acquire the knowledge and skills required to manage a penetration testing project or team, as well as to plan and conduct both internal and external pentests. These activities will be aligned with various standards, including the Penetration Testing Execution Standard (PTES) and the Open Source Security Testing Methodology Manual (OSSTMM). Additionally, you will develop a comprehensive understanding of how to draft reports and propose countermeasures. Through hands-on exercises, you will master penetration testing techniques and gain the skills necessary to lead a pentest team, effectively communicate with clients, and resolve conflicts.
This Certified Lead Ethical Hacking training offers a technical perspective on information security through ethical hacking, utilizing common techniques such as information gathering and vulnerability detection, both inside and outside of a business network.
The training is also aligned with the NICE (The National Initiative for Cybersecurity Education) Protect and Defend framework.
Upon mastering the necessary knowledge and skills in ethical hacking, you may take the exam to apply for the "PECB Certified Lead Ethical Hacker" credential. Holding a PECB Lead Ethical Hacker certificate demonstrates that you have acquired the practical skills to perform and manage penetration tests in accordance with best practices.
Who should attend?
- Individuals interested in IT security, particularly ethical hacking, who wish to learn more about the topic or begin a professional career shift.
- Information security officers and professionals aiming to master ethical hacking and penetration testing techniques.
- Managers or consultants seeking to understand how to oversee the penetration testing process.
- Auditors wishing to perform and conduct professional penetration tests.
- Personnel responsible for maintaining the security of information systems within an organization.
- Technical experts looking to learn how to prepare for a penetration test.
- Cybersecurity professionals and members of information security teams.
MasterClass Certified Ethical Hacker Program
28 HoursThe Certified Ethical Hacker certification is a globally recognized and highly sought-after credential in the field of cybersecurity.
This comprehensive program combines theoretical instruction with practical application to prepare participants for both the CEH certification exam and the CEH Practical Exam. Candidates who successfully complete both assessments earn the prestigious CEH Master credential alongside their standard CEH certification.
Participants have the flexibility to enhance their learning package by choosing to add either the CPENT (Certified Penetration Testing Professional) or the CHFI (Computer Hacking Forensic Investigator) course.
Training for the selected additional course—either CPENT or CHFI—is delivered to each student through EC-Council’s online, self-paced streaming video platform.
CPENT (Penetration Testing):
Instructs students on how to apply the concepts and tools learned in the CEH program within a penetration-testing methodology during live exercises in a cyber range.
CHFI (Computer Forensics):
Teaches a structured approach to computer forensics, covering essential processes such as searching and seizing, chain-of-custody management, data acquisition, preservation, analysis, and the reporting of digital evidence.
Course Description
The CEH program provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventive countermeasures. It teaches participants to think like hackers and understand malicious behavior, enabling them to better design security infrastructure and defend against future attacks. By understanding system weaknesses and vulnerabilities, organizations can strengthen their security controls and minimize the risk of security incidents.
CEH is designed to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, offering participants the opportunity to demonstrate the knowledge and skills required to achieve the CEH credential. You will be exposed to a completely different perspective on the responsibilities and measures required to maintain security.
Who Should Attend
- Law enforcement personnel
- System administrators
- Security officers
- Defense and military personnel
- Legal professionals
- Bankers
- Security professionals
About the Certified Ethical Hacker Master
To earn the CEH Master certification, you must pass the CEH Practical exam. This exam is designed to allow students to prove they can execute the principles taught in the CEH course. The practical exam requires you to demonstrate the application of ethical hacking techniques, such as threat vector identification, network scanning, OS detection, vulnerability analysis, system hacking, and more.
The CEH Practical Exam does not use simulations. Instead, you will be challenging a live range designed to mimic a corporate network using live virtual machines, networks, and applications.
Successfully completing the challenges in the CEH Practical Exam is the next step after attaining the Certified Ethical Hacker (CEH) certification. Passing both the CEH exam and the CEH Practical Exam earns you the additional CEH Master certification.
About the Certified Ethical Hacker Practical
To prove your proficiency in ethical hacking, your abilities are tested through real-world challenges in a realistic environment. Using labs and tools, you must complete specific ethical hacking challenges within a set time limit, mirroring the pressure of real-world scenarios.
The EC-Council CEH (Practical) exam consists of a complex network that replicates a large organization’s real-life network, comprising various network systems (including DMZ, Firewalls, etc.). You must apply your ethical hacking skills to discover and exploit real-time vulnerabilities while also auditing the systems.
About CPENT
EC-Council’s Certified Penetration Tester (CPENT) program focuses entirely on penetration testing. It teaches you to perform in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only worked in flat networks, CPENT’s live practice range will help you elevate your skills by teaching you to pen test IoT and OT systems, write custom exploits, build your own tools, conduct advanced binary exploitation, perform double pivots to access hidden networks, and customize scripts and exploits to penetrate the innermost segments of a network.
About CHFI
The Computer Hacking Forensic Investigator (CHFI) course delivers the discipline of digital forensics from a vendor-neutral perspective. It is a comprehensive course covering major forensic investigation scenarios and enabling students to gain necessary hands-on experience with various forensic investigation techniques and standard forensic tools required to successfully carry out computer forensic investigations.