CourseProviderType
101+ Tips and Tricks with X-Ways ForensicsDFIR TrainingDFIR
Advanced Open Source Intelilgence TrainingOSINT CombineOSINT
Android Forensics Essential TrainingUdemyDFIR
Autopsy TrainingBasic TechDFIR
Become Computer Forensics Expert & Start your career!UdemyDFIR
Build a Forensic Virtual MachineUdemyDFIR
CDFE - Certified Digital Forensics ExaminerUdemyDFIR
Central Management (CM) DeploymentFireeyeDFIR
Certified Digital Forensics Examiner (CDFE)UdemyDFIR
CNFE - Certified Network Forensics ExaminerUdemyDFIR
Computer ForensicsUdemyDFIR
Computer Forensics CertificationUdemyDFIR
Computer Forensics FundamentalsUdemyDFIR
Computer Hacker and Forensic Investigator TrainingUdemyDFIR
Computer Hacking Forensic Investigator (CHFI) Beginner LevelUdemyDFIR
Computer Hacking Forensic Investigator (CHFI) Expert LevelUdemyDFIR
Computer Hacking Forensic Investigator(CHFIv9) Practice ExamUdemyDFIR
Computer Hacking Forensics SpecialistCybraryDFIR
DFIR Case Studies SeriesDFIR TrainingDFIR
Digital Evidence Acquisition: Protecting your CaseUdemyDFIR
Digital Forensic Series: Computer ForensicsUdemyDFIR
Digital Forensic Series: Mobile ForensicsUdemyDFIR
Digital Forensic Series: Network ForensicsUdemyDFIR
Digital Forensics for Cyber ProfessionalsUdemyDFIR
Digital Forensics Tools in Kali Linux: Imaging and HashingPluralsightDFIR
Digital Forensics with Kali LinuxUdemyDFIR
Digital Forensics: Digital Media AnalystPluralsightDFIR
Digital Forensics: Getting Started with File SystemsPluralsightDFIR
Digital Forensics: The Big PicturePluralsightDFIR
Email Security - Cloud EditionFireeyeDFIR
Email Security (EX) DeploymentFireeyeDFIR
Endpoint Security (HX) DeploymentFireeyeDFIR
File Content Security (FX) DeploymentFireeyeDFIR
FOR498: Battlefield Forensics & Data AcquisitionSANSDFIR
FOR500: Windows Forensic AnalysisSANSDFIR
Forensic Operating SystemsDFIR TrainingDFIR
Geolocation ForensicsDFIR TrainingDFIR
Getting Started with Windows Memory ForensicsPluralsightDFIR
Hacking & Digital Forensics & Autopsy - Stay AnonymousUdemyDFIR
IFCI Expert Cybercrime Investigator's CourseUdemyDFIR
Improving security and privacy on Windows OSUdemyDFIR
Incident Forensics: Digital Media AcquisitionPluralsightDFIR
Intermediate Computer ForensicsUdemyDFIR
Introduction to Malware Binary AnalysisFireeyeDFIR
Introduction to Malware ForensicsFireeyeDFIR
IoT ForensicsParabenDFIR
Learning Computer Forensics With Infinite SkillsUdemyDFIR
Malware Analysis (AX) DeploymentFireeyeDFIR
Mobile FundamentalsParabenDFIR
Mobile OperatorParabenDFIR
Network Forensics (PX) DeploymentFireeyeDFIR
Network Security (NX) DeploymentFireeyeDFIR
Open Source Intelligence TrainingAutomating OSINTOSINT
OpenText EnCase Endpoint InvestigatorOpenTextDFIR
OpenText EnCase Endpoint SecurityOpenTextDFIR
OpenText EnCase ForensicOpenTextDFIR
OpenText EnCase Mobile InvestigatorOpenTextDFIR
OpenText EnCase Risk ManagerOpenTextDFIR
OpenText Learning On Demand SubscriptionOpenTextDFIR
OSINT Area & Event Awareness CourseOSINT CombineOSINT
OSINT Fundamental + Social MediaOSINT CombineOSINT
P2C Operator CourseParabenDFIR
Penetration Testing and Ethical HackingCybraryEthical Hacking
Placing the Suspect Behind the KeyboardDFIR TrainingDFIR
Practical Introduction to Digital ForensicsUdemyDFIR
Python Digital ForensicsUdemyDFIR
SDF: Memory Forensics 1UdemyDFIR
SDF: Shimcache ForensicsUdemyDFIR
SDF: Weblog ForensicsUdemyDFIR
SDF: Windows Prefetch ForensicsUdemyDFIR
SEC301: Introduction to Cyber SecuritySANSDFIR
SEC401: Security Essentials Bootcamp StyleSANSDFIR
SEC401: Security Essentials Bootcamp StyleSANSDFIR
SEC402: Cybersecurity Writing: Hack the ReaderSANSDFIR
SEC402: Cybersecurity Writing: Hack the ReaderSANSDFIR
SEC440: Critical Security Controls: Planning, Implementing, and AuditingSANSDFIR
SEC450: Blue Team Fundamentals: Security Operations and AnalysisSANSDFIR
SEC450: Blue Team Fundamentals: Security Operations and AnalysisSANSDFIR
SEC455: SIEM Design & ImplementationSANSDFIR
SEC460: Enterprise Threat and Vulnerability AssessmentSANSDFIR
SEC460: Enterprise Threat and Vulnerability AssessmentSANSDFIR
SEC487: Open-Source Intelligence (OSINT) Gathering and AnalysisSANSOSINT
SEC501: Advanced Security Essentials - Enterprise DefenderSANSDFIR
SEC503: Intrusion Detection In-DepthSANSDFIR
SEC504: Hacker Tools, Techniques, Exploits, and Incident HandlingSANSDFIR
SEC504: Hacker Tools, Techniques, Exploits, and Incident HandlingSANSDFIR
SEC505: Securing Windows and PowerShell AutomationSANSDFIR
SEC506: Securing Linux/UnixSANSDFIR
SEC511: Continuous Monitoring and Security OperationsSANSDFIR
SEC530: Defensible Security Architecture and EngineeringSANSDFIR
SEC530: Defensible Security Architecture and EngineeringSANSDFIR
SEC534: Secure DevOps: A Practical IntroductionSANSDFIR
SEC540: Cloud Security and DevOps AutomationSANSDFIR
SEC540: Cloud Security and DevOps AutomationSANSDFIR
SEC542: Web App Penetration Testing and Ethical HackingSANSDFIR
SEC542: Web App Penetration Testing and Ethical HackingSANSDFIR
SEC545: Cloud Security Architecture and OperationsSANSDFIR
SEC545: Cloud Security Architecture and OperationsSANSDFIR
SEC555: SIEM with Tactical AnalyticsSANSDFIR
SEC560: Network Penetration Testing and Ethical HackingSANSEthical Hacking
SEC560: Network Penetration Testing and Ethical HackingSANSEthical Hacking
SEC566: Implementing and Auditing the Critical Security Controls - In-DepthSANSDFIR
SEC573: Automating Information Security with PythonSANSDFIR
SEC575: Mobile Device Security and Ethical HackingSANSEthical Hacking
SEC580: Metasploit Kung Fu for Enterprise Pen TestingSANSDFIR
SEC599: Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain DefensesSANSDFIR
SEC617: Wireless Penetration Testing and Ethical HackingSANSEthical Hacking
SEC617: Wireless Penetration Testing and Ethical HackingSANSEthical Hacking
SEC642: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation TechniquesSANSEthical Hacking
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical HackingSANSEthical Hacking
Security/Forensics CertificationsOpenTextDFIR
Surviving Digital Forensics: Imaging a Mac Fusion DriveUdemyDFIR
Surviving Digital Forensics: Link FilesUdemyDFIR
Surviving Digital Forensics: RAM Extraction FundamentalsUdemyDFIR
Surviving Digital Forensics: Resolving Attached USBsUdemyDFIR
Surviving Digital Forensics: Understanding OS X Time StampsUdemyDFIR
Surviving Digital Forensics: Volume Shadow CopyUdemyDFIR
Surviving Digital Forensics: Windows ExplorerUdemyDFIR
Surviving Digital Forensics: Windows ShellbagsUdemyDFIR
USB Forensic: Writeblocking and ImpersonationPluralsightDFIR
USB Forensics: DuplicationPluralsightDFIR
USB Forensics: FundamentalsPluralsightDFIR
Windows Forensic EnvironmentDFIR TrainingDFIR
X-Ways Forensics Practitioner's Guide Online CourseDFIR TrainingDFIR