Advanced Computer Forensics Boot Camp

Infosec’s Authorized Computer Forensics Boot Camp prepares you for advanced computer forensics skills, involving a deep dive into volatile memory, registry artifact, file structure and rootkit analysis. 60% of this boot camp is hands-on training!

Award Winning Training

For 17 years InfoSec has been one of the most awarded and trusted IT training vendors - 42 industry awards!

Exam Pass Guarantee

We offer peace of mind with our Exam Pass Guarantee for Flex Pro students.

Analysts Recommended

IDC lists Infosec as Major Player in their Security Training Vendor Assessment.

Advanced Computer Forensics Course Overview

Infosec is proud to offer the Computer Forensics Boot Camp. Accelerated and taught in five (5) days, this in-depth course teaches you advanced computer forensics concepts. This course is intended for those that have either taken the Infosec Computer Forensics Boot Camp, or have experience in the computer forensic profession.

The most current, up-to-date hands-on forensics training available anywhere!

  • Proven Track Record—We have trained more computer forensics examiners than any other training company
  • Expert instructors, with PROVEN field experience (authors, ex-law enforcement, pioneers in the field)
    • We take pride in saying that all of our instructors are active and experienced at producing forensics work that is admissible in court
  • 60% of Boot Camp is Hands On Training
  • Our program includes the opportunity to take the CCFE on-line exam
  • You will learn the core forensics procedures necessary for performing thorough investigations on all computer systems and file types.
  • Possibility to include a fully licensed version of Paraben’s P2 Commander in specific student registration packages (P2 commander is not available on all registration packages).

What You’ll LEARN

Already know how to acquire forensically sound images? Perform file carving? Take your existing forensic knowledge further and sharpen your skills with this Advanced Computer Forensics Boot Camp from Infosec. Upon the completion of our Advanced Computer Forensics Boot Camp, students will know how to: Students must have no criminal record. Computer forensic skills, including the ability or desire to work outside the Windows GUI interface, are necessary.

  • Apply advanced computer forensic analysis concepts to live case work
  • Respond appropriately to immediate response situations
  • Perform Volume Shadow Copy (VSC) analysis
  • Advanced level file and data structure analysis for XP, Windows 7 and Server 2008/2012 systems
  • Registry analysis for XP and Windows 7/8 systems
  • Malware detection and analysis
  • Timeline Analysis
  • Windows Application Analysis
  • Mobile Forensics


This is a very in depth training course and is not intended for individuals who have limited or no computer forensics skills.

Award-winning training that you can trust.

G2 Crowd High Performer

Technical Skills Development Software

Outstanding Partnership Award

Gold Winner

Best Cybersecurity Education Provider

Publisher's Choice

Security Training for Infosec Professionals

Top 20 Company

IT Training

View Pricing

We will never share any of your information, spam you or annoy you with pushy sales pitches.

Daily Course Outline

    DAY 1

    Module 1: Advanced Analysis Concepts

    • Avoiding Speculation
    • Direct and Indirect Artifacts
    • Least Frequency of Occurrence
    • Documentation
    • Convergence
    • Virtualization

    Module 2: Immediate Response

    • Prepared to Respond
    • Questions
    • The Importance of Preparation
    • Logs
    • Data Collection

    DAY 2

    Module 3: VSC Analysis

    • Registry Keys
    • Live Systems
    • Pro Discover
    • F-Response
    • Acquired lmages
    • VHD Method
    • VMware Method
    • Automating VSC Access
    • Pro Discover

    Module 4: File Analysis

    • File System Tunneling
    • Event Logs
    • Windows Event Log
    • Recycle Bin
    • Prefetch Files
    • Scheduled Tasks
    • Skype
    • Apple Products
    • Image Files
    • …more

    DAY 3

    Module 5: Registry Analysis

    • USB Device Analysis
    • System Hive
    • Software Hive
    • Application Analysis
    • NetworkLst
    • NetworkCards
    • Shell bags
    • MUICache
    • UserAssst
    • …more

    Module 6: Malware

    • Introduction and Overview
    • Malware Characteristics
    • Initial Infection Vector
    • Propagation Mechanism
    • Persistence Mechanism
    • Artifacts
    • Detecting Malware
    • Log Analysis
    • …more

    DAY 4

    Module 7: Timeline Analysis

    • Data Sources
    • Time
    • User
    • TLN Format
    • File System Meta data
    • Event Logs
    • Windows
    • …more

    Module 8: Application Analysis

    • Log Files
    • Dynamic Analysis
    • Network Captures
    • Application Memory Analysis

    DAY 5

    Module 9: Mobile Forensics

    • Keyboard caches containing usernames, passwords, search terms, and historical fragments of typed communication.
    • Screenshots preserved from the last state of an application
    • Deleted images from the suspect’s photo library, camera roll, and browsing cache.
    • Deleted address book entries, contacts, calendar events, and other personal data.
    • Exhaustive call history
    • Map tile images from the iPhone’s Google Maps application,
    • Lookups and longitude/latitude coordinates of previous map searches, and coordinates of the last GPS fix.
    • Browser cache and deleted browser objects
    • Cached and deleted email messages
    • SMS messages
    • Deleted voicemail recordings
    • …more

    Our Major Clients

    Book your course

      What Our Students Are Saying

      Without any question, InfoSec has the most gifted individual instructors. Our instructor for this class was both an excellent educator and a premier/world class security expert. He was able to clearly explain and impart to the students, the most complicated security techniques I have ever heard of or imagined. I simply can not find the words to recommend him and Infosec security training more highly.

      John Hollan GE

      Advanced Ethical Hacking Training Boot Camp

      Career Tracks

      • Computer Forensics Investigator

        A Computer Forensics Investigator or Forensic Analyst is a specially trained professional who works with law enforcement agencies, as well as private firms, to retrieve information from computers.
      Ready to get started? Get instant pricing for this award-winning boot camp. View course pricing
      View instant course pricing