Denise Duffy

Computer Forensic Analyst, Cyfortec Group

In addition to being an Infosec instructor, Denise Duffy teaches computer forensics worldwide to European law enforcement through the European Anti-Fraud Office. During her 25-year career at the Middletown Police Department, Denise underwent extensive training in specialized computer and mobile device forensics, including widespread access data courses, multiple IACIS trainings, U.S. Secret Service Training at the National Computer Forensics Institute, BlackBag Technologies Training, many National White Collar Crime (NW3C) courses, an X-Ways online course and considerable Internet Crimes Against Children Training (ICAC) courses. Denise currently holds the following certifications: CFCE (Certified Forensic Computer Examiner), CCFE (Certified Computer Forensics Examiner), CMFE (Certified Mobile Forensics Examiner) and CEH (Certified Ethical Hacker). She is most proud of her two sons who joined the U.S. Military, as Denise is a Desert Shield/Desert Storm veteran herself.

Content from Denise Duffy

Windows Registry Forensics
Learning Path
Windows Registry Forensics

Windows Registry Forensics

The Windows Registry Forensics learning path will enable you to understand the purpose and structure of the files that create the Windows Registry. You will learn to identify, extract and interpret important data from a live and non-live Windows Registry.

Digital Forensics Concepts
Learning Path
Digital Forensics Concepts

Digital Forensics Concepts

The Digital Forensic Concepts path covers the theories used and skills needed by a professional digital forensic examiner.

Introduction to the Windows Registry
Course
Introduction to the Windows Registry

Introduction to the Windows Registry

Discover what the Windows Registry is and why it is important in digital forensic investigations.

Preparing to Examine the Windows Registry
Course
Preparing to Examine the Windows Registry

Preparing to Examine the Windows Registry

Learn how to set up a forensic workstation to properly examine the Windows Registry.

NTUser.Dat Hive File Analysis
Course
NTUser.Dat Hive File Analysis

NTUser.Dat Hive File Analysis

This course demonstrates an in-depth analysis of the artifacts contained within the NTUser.Dat hive file.

SAM Hive File
Course
SAM Hive File

SAM Hive File

This course explains forensic artifacts found in the SAM (Security Account Manager) file, which stores and organizes information about each user on a system.

Software Hive File
Course
Software Hive File

Software Hive File

This course will show examiners how to locate information of forensic value relating to application execution and installation contained within the software hive file.

System Hive File
Course
System Hive File

System Hive File

This course will demonstrate evidence of forensic value contained within the system hive file.

USRClass.dat Hive File
Course
USRClass.dat Hive File

USRClass.dat Hive File

This course identifies and explains forensic artifacts found in the UsrClass.dat hive file.

AmCache Hive File
Course
AmCache Hive File

AmCache Hive File

This course will examine the AmCache hive file, which stores information relating to the execution of applications.

Exceptional learning experiences powered by LX Labs cyber expertise

Infosec Skills courses and labs are powered by LX Labs — our elite team of cyber SMEs, learning specialists and community of top-ranked security instructors, published authors and sought-after industry leaders. We rigorously vet all Infosec Skills training resources to guarantee they meet certification and compliance requirements and align with recognized guidelines like the NICE Cybersecurity Workforce Framework.