Learn Computer Forensics

The Computer Forensics skill path teaches you critical techniques about identifying, preserving, extracting, analyzing and reporting forensic evidence through use of the most popular computer forensic tools.

13 courses  //   79 videos  //   15 hours of training

Free training week — 1,400+ on-demand courses and hands-on labs

Computer Forensics training

This learning path is designed to build a foundation of knowledge and skills around computer forensics. As you progress through 13 courses, you’ll learn about conducting forensics on a variety of platforms and devices, including networks, file and operating systems, memory, email and browsers. Upon completion, you’ll have a base of computer forensics knowledge to carry over to your job or next project — and the skills necessary to conduct an investigation into potential computer crimes.

Learning path components

Computer Forensics Skill Assessment
Assessment
Computer Forensics Skill Assessment

Computer Forensics Skill Assessment

See how your Computer Forensics skills stack up against other professionals in your field.

Number of questions: 20

Computer Forensics Cyber Range
Cyber Range
Computer Forensics Cyber Range

Computer Forensics Cyber Range

This cyber range helps you develop your knowledge of computer forensics by practicing on cloud-hosted virtual machines. You’ll build and reinforce your skills as you progress through labs covering key computer forensics topics, including creating and examining forensic images, performing memory forensics to identify malware activity, data carving and more. You will practice working with poplar forensics tools, such as Volatility and Foremost.

6 labs
1 hours of training

Network Forensics Concepts
Course
Network Forensics Concepts

Network Forensics Concepts

Develop your knowledge of network forensics concepts, tools and techniques as you progress through this five-video course.

5 videos
51 minutes of training

Computer Forensics as a Profession
Course
Computer Forensics as a Profession

Computer Forensics as a Profession

Learn what it's like to be a computer forensics professional in this introductory course covering duties, procedures and practical advice.

3 videos
27 minutes of training

Digital Evidence and Legal Issues
Course
Digital Evidence and Legal Issues

Digital Evidence and Legal Issues

Explore potential legal issues related to digital evidence, review citizens' rights and gain insight into real-world cases in this computer forensics course.

11 videos
112 minutes of training

Computer Forensics Investigations
Course
Computer Forensics Investigations

Computer Forensics Investigations

Take a deep dive into the process of conducting computer forensics investigations, including procedures, methodology, tools and reporting.

14 videos
142 minutes of training

Aspects of Hard Drives
Course
Aspects of Hard Drives

Aspects of Hard Drives

Learn about technical aspects of hard drives and how they relate to computer forensics as you progress through this course.

4 videos
44 minutes of training

File Systems
Course
File Systems

File Systems

Learn all about file systems, including essential topics related to finding and uncovering data, as well as the tools used to do so.

4 videos
45 minutes of training

File and Operating System Forensics
Course
File and Operating System Forensics

File and Operating System Forensics

Explore a variety of concepts around file and operating forensics and learn how those concepts are applied in this eight-video course.

8 videos
86 minutes of training

Email and Browser Forensics
Course
Email and Browser Forensics

Email and Browser Forensics

Explore a variety of concepts around email and browser forensics and learn how those concepts are applied in this eleven-video course.

11 videos
120 minutes of training

Memory Forensics
Course
Memory Forensics

Memory Forensics

Learn all about memory forensics, including using popular tools, conducting live analysis and carrying out basic forensics processes in this brief course.

1 video
19 minutes of training

Data Hiding
Course
Data Hiding

Data Hiding

Explore how cryptographic hashing, stenography and other techniques are used to hide data, as well as how that data can be discovered.

4 videos
40 minutes of training

Passwords and Encryption
Course
Passwords and Encryption

Passwords and Encryption

Discover key forensics concepts and best practices related to passwords and encryption, including how to gain access to a suspect's device.

4 videos
49 minutes of training

New and Emerging Technologies
Course
New and Emerging Technologies

New and Emerging Technologies

Explore how new and emerging technologies are affecting forensics, including virtualization, social networks and gaming.

6 videos
65 minutes of training

Introduction to Mobile Forensics
Course
Introduction to Mobile Forensics

Introduction to Mobile Forensics

Get an introduction to mobile forensics and the challenges mobile devices present to investigators in this overview course.

4 videos
44 minutes of training

 

What you’ll learn.

  • Conducting forensics investigations
  • Using popular forensics tools and techniques
  • Gaining access to devices
  • Discovering hidden data
  • Legal issues around forensics
  • And more!

Who is this for?

Basic computer skills, including the ability or desire to work outside the Windows GUI interface, are recommended. This skill path is designed for:

  • IT and security professionals tasked with corporate forensics and incident handling
  • Law enforcement professionals dealing with computer crimes
  • Legal professionals
  • Anyone with a desire to build their computer forensics skills!

Computer Forensics Cyber Range

This cyber range helps you develop your knowledge in finding and remediating vulnerabilities in C++ code. You’ll build and reinforce your skills as you progress through labs covering a wide range of C++ code security topics, including using ccpcheck, gdb, XQilla and other tools to find common security issues in C++ code, perform control flow analysis and recognize vulnerabilities that can lead to common application attacks, such as buffer and integer overflows or XPath injection. You will also practice identifying format string vulnerabilities, improper type and pointer management, and other risks.

 

Plans & pricing

Infosec Skills Personal

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

Book a Meeting
  • Team administration and reporting
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Skill assessments
  • Create and assign custom learning paths
  • Dedicated client success manager

Award-winning training that you can trust

IDC MarketScape Leader: U.S. IT Training

IDC MarketScape Leader: U.S. IT Training

Infosec Skills

eLearning Content

eLearning Content

Infosec Skills

Best Product - Cybersecurity Training for Infosec Professionals

Best Product - Cybersecurity Training for Infosec Professionals

Infosec Skills

Security Education & Platform

Security Education & Platform

Infosec Skills

Ranked #52 in Top 100 Global Software Sellers

Ranked #52 in Top 100 Global Software Sellers

Infosec

SC Media names Infosec Skills Best IT Security Training

See for yourself why Infosec Skills leads the cybersecurity training industry.