Earn your next certification, guaranteed!

Computer Forensics Boot Camp

Infosec’s Authorized Computer Forensics Boot Camp prepares students for the GCFE and CCFE certification examination by teaching the necessary skills to investigate computer threats and computer crime.

Earn your CCFE, guaranteed!

Boot camp overview

Infosec’s five-day in-depth Computer Forensics Boot Camp teaches students critical techniques and information about identifying, preserving, extracting, analyzing and reporting computer forensic evidence through use of the most popular computer forensic tools.

Our Computer Forensics Boot Camp prepares students for the two industry recognized computer forensic certifications, the GIAC Certified Forensic Examiner (GCFE) and the IACRB Certified Computer Forensics Examiner (CCFE). You are prepared for the certification examinations by learning the necessary skills to recognize the overwhelming number of computer threats and investigate computer crime. Participants will learn about the challenges of computer forensics, walk through the process of forensic analysis and examination, and gain deep understanding of differences in evidence locations and examination techniques on Windows and Linux computers.

Skill up and get certified, guaranteed

Exam Pass Guarantee

If you don’t pass your exam on the first attempt, get a second attempt for free. Includes the ability to re-sit the course for free for up to one year.

100% Satisfaction Guarantee

If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different Flex Pro or Flex Classroom course.

Knowledge Transfer Guarantee

If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.

What's included?

93% pass rate — the best in the industry

  • Five days of training with an expert instructor
  • Infosec digital courseware (physical textbooks available to purchase)
  • CCNP and GCFE exam vouchers
  • 90-day access to course replays (Flex Pro)
  • Curated videos from other top-rated instructors (add-on)
  • 100% Satisfaction Guarantee
  • Exam Pass Guarantee (Flex Pro)

Hands-on labs

Our custom hands-on labs will let you play the part of a forensic examiner. 20+ labs containing over a hundred exercises follow a cohesive scenario, providing you with a complete experience of a forensic investigation, from identifying evidence in a crime scene to extracting and examining artifacts from the suspect’s and victim’s computers. You will use popular commercial and open-source tools to practice and learn new skills in forensics image creation and analysis, examining file signatures and metadata, memory forensics, browser and email forensics, examining social media and cloud artifacts, and many other areas of forensic analysis.

Award-winning training that you can trust

Rising Star

Partner Award

G2 Crowd High Performer

Technical Skills Development Software

Gold Winner

Best Cybersecurity Education Provider

Publisher's Choice

Security Training for Infosec Professionals

Top 20 Company

IT Training

Who should attend?

  • Law enforcement professionals looking to expand into computer crime investigations
  • Legal professionals
  • IT/Infosec pros tasked with corporate forensics and incident handling

Prerequisites

Students must have no criminal record. Basic computer skills, including the ability or desire to work outside the Windows GUI interface, are necessary. A+ certification and/or similar training and experience is not required, but recommended. This is a very in depth training course and is not intended for individuals who have limited or no computer skills.

Why choose Infosec

Your flexible learning experience

Infosec Flex makes expert, live instruction convenient with online and in-person formats tailored to how, when and where you learn best.

Public training boot camps held nationwide

  • Pre-study course materials
  • Live instruction
  • Digital courseware
  • Daily reinforcement materials
  • Catered lunches
  • Infosec community forum access
  • 100% Satisfaction Guarantee
  • Knowledge Transfer Guarantee

Most Popular

Immersive, live-streamed instruction

  • Pre-study course materials
  • Live instruction
  • Digital courseware
  • Daily reinforcement materials
  • Detailed performance reporting
  • Video replays
  • 90-day extended access to materials
  • Infosec community forum access
  • Exam Pass Guarantee
  • 100% Satisfaction Guarantee

Tailored team training at your location

  • Pre-study course materials
  • Live, customized instruction at your location
  • Digital courseware
  • Daily reinforcement materials
  • Detailed team performance reporting
  • Video replays
  • 90-day extended access to materials
  • Infosec community forum access
  • Exam Pass Guarantee
  • 100% Satisfaction Guarantee
  • Knowledge Transfer Guarantee

Course objectives

Upon the completion of our Computer Forensics Boot Camp, students will:

  • Firmly understand the provisions of IT law
  • Learn complex technical concepts
  • Successfully define evidence-handling procedures
  • Comprehend the general rules of evidence
  • Apply the fundamental computer and mobile forensics concepts to forensic investigations
  • Identify key technologies relevant to computer forensics
  • Acquire forensic evidence
  • Locate forensic artifacts in various operating systems
  • Analyze extracted evidence and properly report findings

Industry-leading pass rates

Infosec’s courseware materials are always up to date and synchronized with the latest MCSA and MCSE exam objectives. Our industry-leading curriculum and expert instructors have led to the highest pass rates in the industry. More than 93% of Infosec students pass their certification exams on their first attempt.

Can’t get away for a week?

Learn computer forensics on-demand.

Get the cybersecurity training you need at a pace that fits your schedule with a subscription to Infosec Skills. Includes unlimited access to hundreds of additional on-demand courses — plus cloud-hosted cyber ranges where you can practice and apply knowledge in real-world scenarios — all for just $34 a month!

  • 400+ courses
  • 4 cyber range environments
  • 100+ hands-on labs
  • Certification practice exams
  • 50+ learning paths

You're in good company.

"I’ve taken five boot camps with Infosec and all my instructors have been great."

Jeffrey Coa

Information Security Systems Officer

"The course not only met my expectations, but exceeded them. It was the most engaging online training I’ve ever had."

Val Vask

Commercial Technical Lead

"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."

Julian Tang

Chief Information Officer

Our clients

FedEx
Microsoft
Bank of America
Defense Information Systems Agency
Symantec

Find your boot camp

Computer Forensics Boot Camp details

Day 1

  • Course introduction
  • Computer Forensics and investigation as a profession
    • Define computer forensics
    • Describe how to prepare for computer investigations and explain the difference between law enforcement agency and corporate investigations
    • Explain the importance of maintaining professional conduct
  • Digital evidence – legal issues
    • Identifying digital evidence
    • Evidence admissibility
    • Discovery
    • Warrants
    • Expert witness
    • Roles and responsibilities
    • Ethics
  • Investigations
    • Investigative process
    • Chain of custody
    • Incident response
    • E-discovery
    • Criminal v. civil v. administrative investigations
    • Intellectual property
    • Reporting
    • Quality control
    • Standards
    • Evidence management
  • Current computer forensics tools and hardware
    • Commercial
    • Free/open source

Day 2

  • Forensic science fundamentals
    • Principles and methods
    • Forensic analysis process
  • Hardware
    • Storage media
    • Operating system
  • File systems
  • Erased vs. deleted
  • Live Forensics

Day 3

  • File and Operating System Forensics
    • Keyword Searching
    • Metadata
    • Time line analysis
    • Hash analysis
    • File signatures
    • Volume shadow copies
    • Time zone issues
    • Link files
    • Print Spool
    • Deleted files
    • File slack
    • Damaged media
    • Registry forensics
    • Multimedia files
    • Compound Files
    • Passwords
  • Web and application forensics
    • Common web attack vectors
    • Browser artifacts
    • Email investigations
    • Messaging forensics
    • Database forensics
    • Software forensics
    • Malware analysis

Day 4

  • Network forensics
    • TCP/IP
    • 70Types of attacks
    • Wired vs. wireless
    • Network devices forensics
    • Packet analysis
  • Anti-forensics
    • Hiding
    • Destruction
    • Spoofing
    • Spoofing
    • Log tampering
    • Live operating systems
  • New & emerging technology
    • Legal issues (privacy, obtaining warrants)
    • Social networks forensics
    • Virtualization
    • Cloud forensics
    • Big data
    • Control systems and IoT

Day 5

  • Mobile forensics
    • Types of devices
    • Vendor and carrier identification
    • Obtaining information from cellular provider
    • GSM vs. CDMA
    • Common tools and methodology
  • GCFE exam review
  • CCFE exam review