CSX Advanced Forensics Course

Learn advanced forensics techniques.

Difficulty: Advanced CSF Domain: Respond

$400.00

Price represents the non member rate.

Buy Now
or pay later by invoice

Take the next step in the CSX series of forensics courses! In this course we will take students into a deep dive of some of the more advanced forensics techniques. The course includes a closer look at the following forensics topics:

  • Forensics Tools Setup
  • Network Forensics
  • Steganography
  • Windows Registry
  • Remote Forensics.
Continuing Professional Education (CPE) Credit Count: 16

This course includes:

Ten lessons with hands-on labs that focus on aspects of advanced forensics techniques, plus two bonus challenge labs that test your new skills.

Lesson Introduction to Advanced Forensics

In this lesson you’ll be reintroduced to some of the concepts behind basic forensics. This lesson also includes a course overview of objectives and NIST CSF domains covered. Cybersecurity work roles related to this course as well as some legal information on the use of the materials presented are touched upon in this lesson.

Lesson Preparing the Digital Forensics Environment

Get an overview into the Kali Linux environments forensic tools that we will utilize during the labs in this course. This lesson also goes into the procedures for protecting digital evidence as well as the legal considerations while choosing which tools to use while conducting E-Discovery investigations.

Instructional Lab Kali Forensics Introduction

In this lab, students will refamiliarize themselves with the Kali Linux environment focusing on the forensics capabilities and setup of the operating system.

Instructional Lab Forensics Lab Setup

Continuing with the reintroduction to Kali Linux, students will setup, configure, and run advanced OS features and services such as PostgreSQL and Forman.

Lesson Network Forensics

Network logs and packet captures can be vital in building network forensic cases. In this lab, student will conduct live network captures, extract data from network traffic, and conduct analysis on that data utilizing GUI and command line tools.

Instructional Lab Network Forensics

Network logs and packet captures can be vital in building network forensic cases. In this lab, student will conduct live network captures, extract data from network traffic, and conduct analysis on that data utilizing GUI and command line tools.

Instructional Lab Wireshark and Steganography Essentials

This lab will introduce students to Wireshark and network analysis. This will include packet analysis, data extraction, and conducting live network captures. This lab will also cover the ability to extract hidden data from images as well as metadata.

Lesson Windows Registry Forensics

Windows devices can be prevalent in an enterprise architecture and as a forensics investigator it’s important to know the nuances of any possible operating systems on devices that you may have to investigate. This lesson will touch upon the information you can gather via the Windows registry.

Instructional Lab Windows Registry

Conducting forensics on specific systems may require special tools and skill sets. In the Windows OS the registry is utilized to store application and user data that could be useful in a forensics investigation. In this lab students will utilize special tools and techniques to extract this data from a Windows registry.

Lesson Remote Forensics/Live Response

As off-premises computing technologies such as virtual private servers (VPS) and cloud computing becomes more available, forensic specialist will need to know how to conduct remote operations on systems they do not have physical access to. In this lesson we’ll touch on some of the capabilities and techniques you’ll need to complete remote forensics tasks.

Instructional Lab Remote Forensics

Physical access to a device in an investigation isn’t always possible. With more assets being located elsewhere with containerized systems, Virtual Private Servers (VPS), and the cloud it is important to know how to conduct forensics on a remote device. In this lab students will conduct remote forensics on a server.

CHALLENGE LAB Advanced Forensics Challenge 1

In this challenge lab students will use their skills learned in previous labs to conduct forensics on a compromised machine to discover what was targeted, attribution, and discover possible malware.

CHALLENGE LAB Advanced Forensics Challenge 2

In this challenge lab students will use their skills learned in previous labs to conduct network and image file forensics.

Need training for a team? Contact us for group pricing.