• 708.689.0131
  • Contact us
  • Login
Infosec Logo
  • Infosec Logo
  • Products
  • Solutions
  • Resources
  • Company
  • Product overview
  • Infosec IQ logo Security awareness & culture
  • Infosec Skills logo On-demand training & cyber ranges
  • Infosec Skills Live Boot Camps logo On-demand training & cyber ranges
  • Infosec IQ overview
  • Security awareness training
  • Phishing simulator
  • Reporting & assessments
  • Integrations & automation
  • Global administration
  • Browse all training
  • Pricing & features
  • Demo
  • Infosec Skills overview
  • Role-guided training
  • Infosec Skills Teams
  • Cyber ranges & labs
  • Certifications & CPEs
  • Skill assessments
  • Browse all training
  • Pricing & features
  • Book a meeting
  • Live boot camps
  • Infosec Institute certifications
  • DoD 8570 certifications
  • Get team boot camp pricing
  • View boot camp schedule
  • Book a meeting
  • Pre-built training plans
  • Compliance, industry & role-based training
  • Custom education
  • Personalized learning
  • Languages
  • Gamified learning
  • 1000+ phishing templates
  • Simulation types
  • Phishing email reporter
  • Dashboard reports
  • Security culture survey
  • Assessments
  • Learner analytics
  • Learner management
  • Threat response orchestration
  • Integrations
  • 52 NICE Work Roles
  • SOC Analyst
  • Cloud Security Engineer
  • Security Manager
  • ICS Security Practitioner
  • Security Engineer
  • Penetration Tester
  • Digital Forensics Analyst
  • Information Risk Analyst
  • Security Architect
  • Secure Coder
  • Boot camp overview
  • CISSP Boot Camp
  • Security+ Boot Camp
  • Ethical Hacking Boot Camp
  • CCNA Dual Cert Boot Camp
  • CASP+ Boot Camp
  • CCSP Boot Camp
  • CISM Boot Camp
  • CySA+ Boot Camp
  • PMP Boot Camp
  • Browse all boot camps
Choose Your Own Adventure

Security awareness games by Infosec

Click to Play

On-demand training for every cybersecurity role

Download Catalog

Certification training from industry experts

Get Pricing
  • Solutions overview
  • By organization type
  • By need
  • For business teams
  • For government & contractor teams
  • For MSPs & resellers
  • Security awareness
  • Phishing simulation
  • Technical skill development
  • IT certification
  • Compliance & framework
  • CMMC certification

    2021 IT & Security Talent Pipeline Study

    Download Now
    • Cyber Work
    • Webcasts
    • Case studies
    • Reports & whitepapers
    • Blog
    • Community
    • Infosec Inspire
    • Free tools
    • Cyber Work Podcast
    • Cyber Work Applied
    • Infosec Insiders
    • TechExams
    • YouTube
    • LinkedIn
    • Facebook
    • Twitter
    • Phishing Risk Test
    • Security awareness ROI calculator
    • Security awareness training plans
    • Security awareness buyer’s guide

      Cyber Work Podcast

      New cybersecurity career conversations every week

      Listen Now
      • About us
      • Events & webcasts
      • Careers
      • Scholarships & awards
      • Infosec Gives
      • Infosec Gives Partner Program
      • About us
      • Leadership
      • Newsroom
      • Recognition
      • Industry alliances
      • Infosec Hall of Fame
      • Infosec Security Awareness Awards
      • Infosec Accelerate Scholarship Program

        We’re hiring!

        Join a team dedicated to making a difference.

        Get To Know Us

        Computer Forensics Training Boot Camp

        Learn how to investigate cybercrime! This boot camp goes in-depth into the tools, techniques and processes used by forensics examiners to find and extract evidence from computers.

        ★★★★☆
        4.2
        (443 ratings)
        View Pricing Book a Boot Camp
        standalone-computer-forensics-boot-camp

        Earn your CCFE, guaranteed!

        • Five days of expert, live forensics training
        • Exam Pass Guarantee
        • Exam voucher
        • Unlimited practice exam attempts
        • 100% Satisfaction Guarantee
        • Free annual Infosec Skills subscription ($299 value!)
        • 1-year access to all boot camp video replays and materials
        • Onsite proctoring of exam
        • Pre-study learning path
        • Knowledge Transfer Guarantee

        Hands-on labs

        Play the part of a forensic examiner in our custom lab environment. More than 30 labs containing over a hundred exercises follow a cohesive scenario, providing you with a complete experience of a forensic investigation, from identifying evidence in a crime scene to extracting and examining artifacts from the suspect’s and victim’s computers. You will use popular commercial and open-source tools to practice and learn new skills in forensics image creation and analysis, examining file signatures and metadata, memory forensics, browser and email forensics, examining social media and cloud artifacts, and many other areas of forensic analysis.

        Certification details

        • Law, ethics and legal issues
        • The investigation process
        • Computer forensics tools
        • Hard disk evidence recovery & integrity
        • Digital device recovery & integrity
        • File system forensics
        • Evidence analysis & correlation
        • Evidence recovery of Windows-based systems
        • Network and volatile memory forensics
        • Report writing

         

        View full course schedule

        Training overview

        Infosec’s Computer Forensics Boot Camp teaches you how to identify, preserve, extract, analyze and report forensic evidence on computers. You will learn about the challenges of computer forensics, walk through the process of analysis and examination of operating systems, and gain a deep understanding of differences in evidence locations and examination techniques on Windows and Linux computers.

        More than 30 hands-on labs simulating a real cybercrime investigation provide you with practical experience using commercial and open-source forensic tools. This boot camp also prepares you to become a Certified Computer Forensics Examiner (CCFE).

        What you'll learn

        • Provisions of IT law
        • Complex technical forensics concepts
        • How to apply forensics concepts to forensic investigations
        • Evidence-handling procedures and the general rules of evidence
        • Key technologies used in computers
        • Full range of computer forensics tools
        • Acquiring forensic evidence
        • Locating forensic artifacts in various operating systems
        • Analyzing extracted evidence
        • Properly reporting findings
        • Skills needed to track an offender on the internet
        • How to work with law enforcement
        • How to design an incident response strategy

        Who should attend

        • Law enforcement professionals looking to expand into computer crime investigations
        • Legal professionals
        • IT/Infosec pros tasked with corporate forensics and incident handling
        • Anyone with a desire to learn about computer forensics and develop their skills

        Prerequisites

        Students must have no criminal record. Basic computer skills, including the ability or desire to work outside the Windows GUI interface, are necessary. A+ certification and/or similar training and experience is not required, but recommended. This is a very in depth training course and is not intended for individuals who have limited or no computer skills.

        Everything you need to earn your CCFE

        • Five days of expert, live forensics training
        • Exam Pass Guarantee
        • Exam voucher
        • Unlimited practice exam attempts
        • 100% Satisfaction Guarantee
        • Free annual Infosec Skills subscription ($299 value!)
        • 1-year access to all boot camp video replays and materials
        • Onsite proctoring of exam
        • Pre-study learning path
        • Knowledge Transfer Guarantee
        Everything you need to earn your CCFE
        View Pricing

        Exam Pass Guarantee

        We guarantee you’ll pass your exam on the first attempt. Learn more. 

        CCFE training schedule

        Infosec’s CCFE training is more than just a boot camp. We support you before, during and after your live training to ensure you’re fully prepared for your exam — and get certified on your first attempt.

        • Before your boot camp
          • Start learning now. You’ll get immediate access to all the content in Infosec Skills the moment you enroll. Prepare for your live boot camp, uncover your knowledge gaps and maximize your training experience.

        • During your boot camp
          • Day 1

            • Course introduction
            • Computer Forensics and investigation as a profession
              • Define computer forensics
              • Describe how to prepare for computer investigations and explain the difference between law enforcement agency and corporate investigations
              • Explain the importance of maintaining professional conduct
            • Digital evidence — legal issues
              • Identifying digital evidence
              • Evidence admissibility
                • Federal rules of evidence
                • Daubert standard
              • Discovery
              • Warrants
                • What is seizure?
                • Consent issues
              • Expert witness
              • Roles and responsibilities
              • Ethics
                • (ISC)²
                • AAFS
                • ISO
            • Investigations
              • Investigative process
              • Chain of custody
              • Incident response
              • E-discovery
              • Criminal v. civil v. administrative investigations
              • Intellectual property
                • Markman hearing
              • Reporting
              • Quality control
                • Lab and tool
                • Investigator
                • Examination
                • Standards
              • Evidence management
                • SOPS
                • Collection
                • Documentation
                • Preservation
                • Transport/tracking
                • Storage/access control
                • Disposition
            • Current computer forensics tools and hardware
              • Commercial
              • Free/open source

            Day 2

            • Forensic science fundamentals
              • Principles and methods
                • Locard’s Principle
                • Inman-Rudin Paradigm
                • Scientific method
                • Peer review
              • Forensic analysis process
            • Hardware
              • Storage media
                • Hard disk geometry
                • Solid state drives
                • RAIDS
              • Operating system
                • Boot process
                • BIOS/CMOS
                • The Swap File
            • File systems
              • File systems
                • NTFS file system
                • FAT file system
                • HFS+
                • Ext2/3/4
                • Embedded
              • Erased vs. deleted
              • Live Forensics

            Day 3

            • File and Operating System Forensics
              • Keyword Searching
              • Metadata
              • Time line analysis
              • Hash analysis
              • File signatures
                • File filtering (KFF)
              • Volume shadow copies
              • Time zone issues
              • Link files
              • Print Spool
              • Deleted files
                • Recycle bin forensics
              • File slack
              • Damaged media
                • Physical damage
                • Logical damage
                • File carving
              • Registry forensics
                • USB devices
                • HKLM
              • Multimedia files
                • EXIF data
              • Compound files
                • Compression
                • Ole
                • AD
              • Passwords
            • Web and application forensics
              • Common web attack vectors
                • SQL injection
                • Cross-site scripting
                • Cookies
              • Browser artifacts
              • Email investigations
                • Email headers
                • Email files
              • Messaging forensics
              • Database forensics
              • Software forensics
                • Traces and application debris
                • Software analysis (hashes, code comparison techniques, etc.)
              • Malware analysis
                • Malware types and behavior
                • Static vs. dynamic analysis

            Day 4

            • Network forensics
              • TCP/IP
                • IP addressing
                • Proxies
                • Ports and services
              • Types of attacks
              • Wired vs. wireless
              • Network devises forensics
                • Routers
                • Firewalls
                • Examining logs
            • Packet analysis
              • OS utilities
                • Netstat
                • Net sessions
                • Openfles
              • Network monitoring tools
                • SNORT
                • Wireshark
                • NetworkMiner
            • Anti-forensics
              • Hiding
                • Encryption
                • Symmetric
                • Asymmetric
                • TrueCrypt hidden partitions
              • Steganography
              • Packing
              • Hidden devices (NAS)
              • Tunneling/Onion routing
              • Destruction
                • Wiping/overwriting
                • Corruption/degaussing
              • Spoofing
                • Address spoofing
                • Data spoofing
                • Timestamping
              • Log tampering
              • Live operating systems

            Day 5

            • New & emerging technology
              • Legal issues (privacy, obtaining warrants)
              • Social networks forensics
              • Types of social networks
              • Types of evidence
              • Collecting data
              • Virtualization
              • Virtualization forensics
              • Use of virtualization in forensics
              • Cloud forensics
              • Types of cloud services
              • Challenges of cloud forensics
              • Big data
              • Control systems and IoT
            • Mobile forensics
              • Types of devices
              • GPS
              • Cell phones
              • Tablets
              • Vendor and carrier identification
              • Obtaining information from a cellular provider
              • GSM vs. CDMA
              • Common tools and methodology
        • After your boot camp
          • Your boot camp includes a 1-year subscription to Infosec Skills, so you can take additional time to prepare for your exam, get a head start on your next certification goal or start earning CPEs.

        Free CCFE training resources

        Get started in computer forensics: Entry-level tips, skills and career paths

        This week we're excited to have back one of the major figures in digital forensics, Paraben CEO Amber Schroader. Amber dives deep into the specific forensics skills you need to be successful, traits that make a good forensics investigator (her best team member is someone with a psychology background!) and the art of understanding language and semantics — all while walking us through key moments of a case. If you're looking towards career advice in computer forensics, get ready to learn from one of the best!

        Amber Schroader is the CEO & Founder of Paraben Corporation. She has spent the last two decades as a driving force for innovation in digital forensics. Amber has developed over two-dozen software programs designed for the purposes of recovering digital data from mobile phones, computer hard drives, email and live monitoring services. In addition to designing technology for digital forensics, she also spearheaded the procedures for mobile and smartphone devices as well as the emerging field of IoT devices. Amber is the patent holder on the EMI shielding container, otherwise known as a Faraday bag, as well as inventor to many other shielding products. Amber has written and taught numerous classes for this specialized field as well as founded multiple certifications in the field. Ms. Schroader continues support through book contributions and other industry speaking engagements.

        Listen Now

        How to become a computer forensics investigator

        Amber Schroader, president and CEO at Paraben Corporation, discusses the path you can take to launch a career in computer forensics. The Infosec career series aims to break down the path from security newcomer to an elite security practitioner.

        Listen Now

        Computer forensics careers: Taking down a $1.2 billion Ponzi scheme

        Few people know what it's like to help take down a $1.2 billion dollar Ponzi scheme, but that's exactly what today's guest did. Sam Rubin, VP at The Crypsis Group, explains how he had to re-create the crime within a courtroom, as well as the tasks of digital forensics folks at all levels, from intern to the person giving the testimony. There's a good chance you may want to go into a career in forensics after listening to all of Sam's stories.

        Sam Rubin is a Vice President at The Crypsis Group, where he leads the firm’s Managed Security Services business, assists clients and develops the firm’s business expansion strategies. Sam is an industry-recognized cybersecurity professional with wide-ranging expertise in data breach incident response, digital forensics and cybersecurity risk management. Sam frequently serves as an expert witness and has provided expert opinions in numerous high-stakes matters, including a landmark civil trade secret misappropriation case, a criminal securities fraud matter and civil litigation stemming from a multi-billion-dollar Ponzi scheme. Sam is a frequent presenter, author and lecturer on cyber-related topics, including digital forensics and incident response, insider threats and information security best practices. Before joining Crypsis in 2017, Sam was at Stroz Friedberg, where he was Managing Director and head of the company’s west region digital forensic practice.

        Listen Now

        Find your boot camp

        Take the course online?
        Learn more about online
        866.471.0059
        • Today
        • Next week
        • Next month
        See additional dates

        Sign up

        Enroll in a boot camp

          See additional dates
          Infosec logo

          Products

          Infosec IQ Security awareness, culture & phishing simulator Infosec Skills Hands-on skill development & boot camps

          Resources

          Cyber Work Blog Infosec Inspire Events & webcasts

          Company

          Contact us About Infosec Careers Newsroom Partners
          • ©2022 Infosec Institute, Inc.
            • Trademarks
            • Privacy Policy

          Infosec, part of Cengage Group

          We use cookies to personalize your experience and optimize site functionality. Accept Cookie settings
          Privacy & Cookies Policy

          Infosec cookie notice

          We use cookies to help understand your needs, optimize website functionality and give you the best experience possible. Use this policy to understand how, when and where cookies are stored on your device. 

          Want to know more? Contact [email protected].
          Necessary
          Always Enabled
          This type of cookie helps keep our website functioning. They provide access to account-based features and other secure areas of our site, and do not store information about you that could be used for marketing. This category of cookies cannot be disabled.
          Analytics
          Google Analytics cookies help us understand how visitors use our site. All data collected from Google Analytics is anonymized (including your IP address) and stored by Google on U.S. servers.
          Marketing
          We use this type of cookie to optimize our marketing campaigns. Marketing cookies are delivered by our database when you visit our site, complete a form or open email from us. Information stored in this cookie includes personal information like your name and what pages you view on our site.
          Save & Accept