eForensics Magazine and Courses

Image Event Event Date Event End Date Location
Digital forensic review procedures in the cloud (W20) Digital forensic review procedures in the cloud (W20) OnDemand 12-31-2099 Online (OnDemand)
Digital Visual Media Anti–Forensics and Counter Anti–Forensics (W34) Digital Visual Media Anti–Forensics and Counter Anti–Forensics (W34) OnDemand 12-31-2099 Online (OnDemand)
How to Be Ready for Forensic Investigations (W33) How to Be Ready for Forensic Investigations (W33) OnDemand 12-31-2099 Online (OnDemand)
Analyzing malicious documents (W32) Analyzing malicious documents (W32) OnDemand 12-31-2099 Online (OnDemand)
Windows Registry and Log Analysis (W31) Windows Registry and Log Analysis (W31) OnDemand 12-31-2099 Online (OnDemand)
Ransomware Forensics (W30) Ransomware Forensics (W30) OnDemand 12-31-2099 Online (OnDemand)
Digital Video Forensics (W28) Digital Video Forensics (W28) OnDemand 12-31-2099 Online (OnDemand)
Forensic analysis for system boundary identification and security (W27) Forensic analysis for system boundary identification and security (W27) OnDemand 12-31-2099 Online (OnDemand)
Windows 10 Live Analysis Using Sysinternals (W26) Windows 10 Live Analysis Using Sysinternals (W26) OnDemand 12-31-2099 Online (OnDemand)
Live Analysis with Rekall (W25) Live Analysis with Rekall (W25) OnDemand 12-31-2099 Online (OnDemand)
Android Malware Analysis (W24) Android Malware Analysis (W24) OnDemand 12-31-2099 Online (OnDemand)
Introduction to eDiscovery (W23) Introduction to eDiscovery (W23) OnDemand 12-31-2099 Online (OnDemand)
The Ultimate CISSP Study Guide (W22) The Ultimate CISSP Study Guide (W22) OnDemand 12-31-2099 Online (OnDemand)
Exploitation with Armitage (W21) Exploitation with Armitage (W21) OnDemand 12-31-2099 Online (OnDemand)
Introduction to Fusion–Based Digital Visual Media Forensics (W35) Introduction to Fusion–Based Digital Visual Media Forensics (W35) OnDemand 12-31-2099 Online (OnDemand)
Software Reverse Engineering Techniques - Level 1 (W19) Software Reverse Engineering Techniques - Level 1 (W19) OnDemand 12-31-2099 Online (OnDemand)
Wireless Security Attacks (W18) Wireless Security Attacks (W18) OnDemand 12-31-2099 Online (OnDemand)
Build Your Own Pen Test Lab (W17) Build Your Own Pen Test Lab (W17) OnDemand 12-31-2099 Online (OnDemand)
Practical Social Engineering (W16) Practical Social Engineering (W16) OnDemand 12-31-2099 Online (OnDemand)
CCFP Training (W13) CCFP Training (W13) OnDemand 12-31-2099 Online (OnDemand)
Advanced Smartphone Forensics (W15) Advanced Smartphone Forensics (W15) OnDemand 12-31-2099 Online (OnDemand)
WINDOWS FORENSICS ANALYSIS Self-Paced Mentored Online Training (W14) WINDOWS FORENSICS ANALYSIS Self-Paced Mentored Online Training (W14) OnDemand 12-31-2099 Online (OnDemand)
CFIP MasterClass - FORENSIC INVESTIGATION STEPS AND METHODOLOGY (W12) CFIP MasterClass - FORENSIC INVESTIGATION STEPS AND METHODOLOGY (W12) OnDemand 12-31-2099 Online (OnDemand)
Create a report - Forensics Imaging Self-Paced Online Training (W10) Create a report - Forensics Imaging Self-Paced Online Training (W10) OnDemand 12-31-2099 Online (OnDemand)
Malware Analysis StarterKit (W02) Malware Analysis StarterKit (W02) OnDemand 12-31-2099 Online (OnDemand)
Computer Forensics In Practice Complete Course (W04) Computer Forensics In Practice Complete Course (W04) OnDemand 12-31-2099 Online (OnDemand)
Master Your CSA Star (W03) Master Your CSA Star (W03) OnDemand 12-31-2099 Online (OnDemand)
Packet Analysis with Wireshark and PCAP analysis tools (W01) Packet Analysis with Wireshark and PCAP analysis tools (W01) OnDemand 12-31-2099 Online (OnDemand)
Digital Forensic Imaging - Tools & Methods (W47) Digital Forensic Imaging - Tools & Methods (W47) OnDemand 12-31-2099 Online (OnDemand)
Micro-drone Warfare: Cybersecurity Implications and Countermeasures (W61) Micro-drone Warfare: Cybersecurity Implications and Countermeasures (W61) OnDemand 12-31-2099 Online (OnDemand)
Data Integrity And Evidence Handling in Digital Forensics - Course Online (W60) Data Integrity And Evidence Handling in Digital Forensics - Course Online (W60) OnDemand 12-31-2099 Online (OnDemand)
eForensics Course for eWarfare: Investigations, Threat Detection and Reconnaissance in the Electromagnetic Spectrum (W59) eForensics Course for eWarfare: Investigations, Threat Detection and Reconnaissance in the Electromagnetic Spectrum (W59) OnDemand 12-31-2099 Online (OnDemand)
Browser Forensics (W57) Browser Forensics (W57) OnDemand 12-31-2099 Online (OnDemand)
Cloud Forensics (W56) Cloud Forensics (W56) OnDemand 12-31-2099 Online (OnDemand)
Windows Forensics (W55) Windows Forensics (W55) OnDemand 12-31-2099 Online (OnDemand)
Natural Language Processing for OSINT & Threat Analysis (W54) Natural Language Processing for OSINT & Threat Analysis (W54) OnDemand 12-31-2099 Online (OnDemand)
IoT Forensics - DVID Challenge (W53) IoT Forensics - DVID Challenge (W53) OnDemand 12-31-2099 Online (OnDemand)
PowerShell in Digital Forensics (W52) PowerShell in Digital Forensics (W52) OnDemand 12-31-2099 Online (OnDemand)
Digital Image Forensics: Lessons in Tampering and Fake Image Detection (W51) Digital Image Forensics: Lessons in Tampering and Fake Image Detection (W51) OnDemand 12-31-2099 Online (OnDemand)
iOS Social Media Forensics (W50) iOS Social Media Forensics (W50) OnDemand 12-31-2099 Online (OnDemand)
Shodan, OSINT & IoT Devices (W49) Shodan, OSINT & IoT Devices (W49) OnDemand 12-31-2099 Online (OnDemand)
Network Monitoring with Security Onion (W48) Network Monitoring with Security Onion (W48) OnDemand 12-31-2099 Online (OnDemand)
Deepfake Audio: A Comprehensive Study in Digital Forensics Course Online (W62) Deepfake Audio: A Comprehensive Study in Digital Forensics Course Online (W62) OnDemand 12-31-2099 Online (OnDemand)
Android Mobile Forensics (W46) Android Mobile Forensics (W46) OnDemand 12-31-2099 Online (OnDemand)
Linux Kernel Security (W45) Linux Kernel Security (W45) OnDemand 12-31-2099 Online (OnDemand)
Drone Forensics (W44) Drone Forensics (W44) OnDemand 12-31-2099 Online (OnDemand)
Investigate Cyber Fraud - Real-Life Cases (W43) Investigate Cyber Fraud - Real-Life Cases (W43) OnDemand 12-31-2099 Online (OnDemand)
Open Source Intelligence for Forensics (W41) Open Source Intelligence for Forensics (W41) OnDemand 12-31-2099 Online (OnDemand)
Ubuntu Forensics (W42) Ubuntu Forensics (W42) OnDemand 12-31-2099 Online (OnDemand)
New Technology File System (NTFS) Forensics (W40) New Technology File System (NTFS) Forensics (W40) OnDemand 12-31-2099 Online (OnDemand)
DNS Malware Analysis: A Forensic Approach (W39) DNS Malware Analysis: A Forensic Approach (W39) OnDemand 12-31-2099 Online (OnDemand)
Log files: Attacks & Defenses (W38) Log files: Attacks & Defenses (W38) OnDemand 12-31-2099 Online (OnDemand)
MacOS Anti-Forensics (W37) MacOS Anti-Forensics (W37) OnDemand 12-31-2099 Online (OnDemand)
Fourth Extended File System (EXT4) Forensics (W36) Fourth Extended File System (EXT4) Forensics (W36) OnDemand 12-31-2099 Online (OnDemand)
Recovering virtual machines from lost VMFS partitions (W29) Recovering virtual machines from lost VMFS partitions (W29) OnDemand 12-31-2099 Online (OnDemand)