Digital Investigations - Advanced Training Course
In this course, you will learn the principles and techniques for digital forensics investigation and the spectrum of available computer forensics tools. You will learn about core forensics procedures to ensure court admissibility of evidence, as well as the legal and ethical implications.
You will learn how to perform a forensic investigation on both Unix/Linux and Windows systems with different file systems. with many advanced topics like wireless, network, web, DB and Mobile crimes investigation
Course Outline
At the end of this course you will be able to demonstrate knowledge and understanding of:
- Forensics Investigation Process
- Use Guidance Encase and FTK Access Data
- Cryptography, Steganography, Media Files Forensic techniques
- Password Cracking
- Investigating Wireless Attacks
- Investigating Web Applications Attacks
- Investigating Web Servers Attacks
- Investigating Database Servers Attacks
- Investigating Email Crimes
- Investigating Mobile Applications Crimes
Requirements
Work experience in an IT or IT-related role
Attend Digital Forensic Investigation - Introduction
Need help picking the right course?
Digital Investigations - Advanced Training Course - Enquiry
Testimonials (2)
It was clear and with very good examples
Carlo Beccia - Aethra Telecomunications SRL
Course - AI-Powered Cybersecurity: Advanced Threat Detection & Response
The trainer was very knowledgable and took time to give a very good insight into cyber security issues. A lot of these examples could be used or modified for our learners and create some very engaging lesson activities.
Jenna - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
Upcoming Courses
Related Courses
AI-Powered Cybersecurity: Threat Detection & Response
21 HoursThis instructor-led, live training in Saudi Arabia (online or onsite) is aimed at beginner-level cybersecurity professionals who wish to learn how to leverage AI for improved threat detection and response capabilities.
By the end of this training, participants will be able to:
- Understand AI applications in cybersecurity.
- Implement AI algorithms for threat detection.
- Automate incident response with AI tools.
- Integrate AI into existing cybersecurity infrastructure.
AI-Powered Cybersecurity: Advanced Threat Detection & Response
28 HoursThis instructor-led, live training in Saudi Arabia (online or onsite) is aimed at intermediate-level to advanced-level cybersecurity professionals who wish to elevate their skills in AI-driven threat detection and incident response.
By the end of this training, participants will be able to:
- Implement advanced AI algorithms for real-time threat detection.
- Customize AI models for specific cybersecurity challenges.
- Develop automation workflows for threat response.
- Secure AI-driven security tools against adversarial attacks.
Blue Team Fundamentals: Security Operations and Analysis
21 HoursThis instructor-led, live training in Saudi Arabia (online or onsite) is aimed at intermediate-level IT security professionals who wish to develop skills in security monitoring, analysis, and response.
By the end of this training, participants will be able to:
- Understand the role of a Blue Team in cybersecurity operations.
- Use SIEM tools for security monitoring and log analysis.
- Detect, analyze, and respond to security incidents.
- Perform network traffic analysis and threat intelligence gathering.
- Apply best practices in security operations center (SOC) workflows.
Bug Bounty Hunting
21 HoursBug Bounty Hunting is the practice of identifying security vulnerabilities in software, websites, or systems and responsibly reporting them for rewards or recognition.
This instructor-led, live training (online or onsite) is aimed at beginner-level security researchers, developers, and IT professionals who wish to learn the fundamentals of ethical bug hunting and how to participate in bug bounty programs.
By the end of this training, participants will be able to:
- Understand the core concepts of vulnerability discovery and bug bounty programs.
- Use key tools like Burp Suite and browser dev tools for testing applications.
- Identify common web security flaws such as XSS, SQLi, and CSRF.
- Submit clear, actionable vulnerability reports to bug bounty platforms.
Format of the Course
- Interactive lecture and discussion.
- Hands-on use of bug bounty tools in simulated testing environments.
- Guided exercises focused on discovering, exploiting, and reporting vulnerabilities.
Course Customization Options
- To request a customized training for this course based on your organization's applications or testing needs, please contact us to arrange.
Bug Bounty: Advanced Techniques and Automation
21 HoursBug Bounty: Advanced Techniques and Automation is a deep dive into high-impact vulnerabilities, automation frameworks, recon techniques, and the tooling strategies used by elite bug bounty hunters.
This instructor-led, live training (online or onsite) is aimed at intermediate-level to advanced-level security researchers, penetration testers, and bug bounty hunters who wish to automate their workflows, scale reconnaissance, and discover complex vulnerabilities across multiple targets.
By the end of this training, participants will be able to:
- Automate reconnaissance and scanning for multiple targets.
- Leverage cutting-edge tools and scripts used in bounty automation.
- Discover complex, logic-based vulnerabilities beyond standard scans.
- Build custom workflows for subdomain enumeration, fuzzing, and reporting.
Format of the Course
- Interactive lecture and discussion.
- Hands-on use of advanced tools and scripting for automation.
- Guided labs focused on real-world bounty workflows and advanced attack chains.
Course Customization Options
- To request a customized training for this course based on your bounty targets, automation needs, or internal security challenges, please contact us to arrange.
Cyber Defence (SOC) Analyst Foundation
7 HoursThis instructor-led, live training in Saudi Arabia (online or onsite) is aimed at beginner to intermediate-level security analysts and system administrators who wish to establish a foundational understanding of Cyber Defence (SOC) analysis.
By the end of this training, participants will be able to:
- Understand the principles of Security Management in a Cyber Defence context.
- Execute effective Incident Response strategies to mitigate security incidents.
- Implement Security Education practices to enhance organizational awareness and preparedness.
- Manage and analyze Security Information for proactive threat identification.
- Utilize Event Management techniques to monitor and respond to security events.
- Implement Vulnerability Management processes to identify and address system vulnerabilities.
- Develop skills in Threat Detection to identify and respond to potential cyber threats.
- Participate in Simulated Attacks to test and improve incident response capabilities.
CHFI - Certified Digital Forensics Examiner
35 HoursThe Certified Digital Forensics Examiner vendor neutral certification is designed to train Cyber Crime and Fraud Investigators whereby students are taught electronic discovery and advanced investigation techniques. This course is essential to anyone encountering digital evidence while conducting an investigation.
The Certified Digital Forensics Examiner training teaches the methodology for conducting a computer forensic examination. Students will learn to use forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-custody, and write a findings report.
The Certified Digital Forensics Examiner course will benefit organizations, individuals, government offices, and law enforcement agencies interested in pursuing litigation, proof of guilt, or corrective action based on digital evidence.
Certified Incident Handler
21 HoursCertified Incident Handler is a course that provides a structured approach to managing and responding to cybersecurity incidents effectively and efficiently.
This instructor-led, live training (online or onsite) is aimed at intermediate-level IT security professionals who wish to develop the tactical skills and knowledge needed to plan, classify, contain, and manage security incidents.
By the end of this training, participants will be able to:
- Understand the incident response lifecycle and its phases.
- Execute incident detection, classification, and notification procedures.
- Apply containment, eradication, and recovery strategies effectively.
- Develop post-incident reporting and continuous improvement plans.
Format of the Course
- Interactive lecture and discussion.
- Hands-on use of incident handling procedures in simulated scenarios.
- Guided exercises focused on detection, containment, and response workflows.
Course Customization Options
- To request a customized training for this course based on your organization's incident response procedures or tools, please contact us to arrange.
Mastering Continuous Threat Exposure Management (CTEM)
28 HoursThis instructor-led, live training in Saudi Arabia (online or onsite) is aimed at intermediate-level cybersecurity professionals who wish to implement CTEM in their organizations.
By the end of this training, participants will be able to:
- Understand the principles and stages of CTEM.
- Identify and prioritize risks using CTEM methodologies.
- Integrate CTEM practices into existing security protocols.
- Utilize tools and technologies for continuous threat management.
- Develop strategies to validate and improve security measures continuously.
Cyber Emergency Response Team (CERT)
7 HoursThis course discusses how to manage an incident response team. how the first responder act, given the frequency and complexity of today's cyber attacks, incident response is a critical function for organizations.
Incident response is the last line of defense, detecting and efficiently responding to incidents requires strong management processes, and managing an incident response team requires special skills and knowledge
Cyber Threat Intelligence
35 HoursThis instructor-led, live training in Saudi Arabia (online or onsite) is aimed at advanced-level cyber security professionals who wish to understand Cyber Threat Intelligence and learn skills to effectively manage and mitigate cyber threats.
By the end of this training, participants will be able to:
- Understand the fundamentals of Cyber Threat Intelligence (CTI).
- Analyze the current cyber threat landscape.
- Collect and process intelligence data.
- Perform advanced threat analysis.
- Leverage Threat Intelligence Platforms (TIPs) and automate threat intelligence processes.
Fundamentals of Corporate Cyber Warfare
14 HoursThis instructor-led, live training in Saudi Arabia (online or onsite) covers the different aspects of enterprise security, from AI to database security. It also includes coverage of the latest tools, processes and mindset needed to protect from attacks.
DeepSeek for Cybersecurity and Threat Detection
14 HoursThis instructor-led, live training in Saudi Arabia (online or onsite) is aimed at intermediate-level cybersecurity professionals who wish to leverage DeepSeek for advanced threat detection and automation.
By the end of this training, participants will be able to:
- Utilize DeepSeek AI for real-time threat detection and analysis.
- Implement AI-driven anomaly detection techniques.
- Automate security monitoring and response using DeepSeek.
- Integrate DeepSeek into existing cybersecurity frameworks.
Duty Managers Cyber Resilience
14 HoursThis instructor-led, live training in Saudi Arabia (online or onsite) is aimed at intermediate-level duty managers and operational leaders who wish to build robust cyber resilience strategies to safeguard their organizations against cyber threats.
By the end of this training, participants will be able to:
- Understand cyber resilience fundamentals and their relevance to duty management.
- Develop incident response plans to maintain operational continuity.
- Identify potential cyber threats and vulnerabilities within their environment.
- Implement security protocols to minimize risk exposure.
- Coordinate team response during cyber incidents and recovery processes.
Junior Detection Engineer Essentials
21 HoursDetection engineering is the practice of designing, implementing, and refining methods to identify malicious behavior across systems and networks.
This instructor-led, live training (online or onsite) is aimed at beginner-level cybersecurity practitioners who wish to gain practical skills in building and tuning security detections.
Upon completion of this training, participants will have the skills needed to:
- Develop effective detection rules and signatures using common security tools.
- Interpret logs and telemetry to identify suspicious behaviors.
- Apply threat intelligence to strengthen detection logic.
- Optimize alerts and reduce false positives within a SOC workflow.
Format of the Course
- Guided instruction with practical demonstrations.
- Scenario-driven exercises and hands-on analysis.
- Real-world detection building within an interactive lab environment.
Course Customization Options
- If your organization requires a tailored version of this program, please contact us to discuss customization options.