eForensics Magazine and Courses

Image Event Event Date Event End Date Location
The Ultimate CISSP Study Guide (W22) The Ultimate CISSP Study Guide (W22) OnDemand OnDemand Online (OnDemand)
Exploitation with Armitage (W21) Exploitation with Armitage (W21) OnDemand OnDemand Online (OnDemand)
Digital forensic review procedures in the cloud (W20) Digital forensic review procedures in the cloud (W20) OnDemand OnDemand Online (OnDemand)
Software Reverse Engineering Techniques - Level 1 (W19) Software Reverse Engineering Techniques - Level 1 (W19) OnDemand OnDemand Online (OnDemand)
Wireless Security Attacks (W18) Wireless Security Attacks (W18) OnDemand OnDemand Online (OnDemand)
Build Your Own Pen Test Lab (W17) Build Your Own Pen Test Lab (W17) OnDemand OnDemand Online (OnDemand)
Practical Social Engineering (W16) Practical Social Engineering (W16) OnDemand OnDemand Online (OnDemand)
CCFP Training (W13) CCFP Training (W13) OnDemand OnDemand Online (OnDemand)
Advanced Smartphone Forensics (W15) Advanced Smartphone Forensics (W15) OnDemand OnDemand Online (OnDemand)
WINDOWS FORENSICS ANALYSIS Self-Paced Mentored Online Training (W14) WINDOWS FORENSICS ANALYSIS Self-Paced Mentored Online Training (W14) OnDemand OnDemand Online (OnDemand)
CFIP MasterClass - FORENSIC INVESTIGATION STEPS AND METHODOLOGY (W12) CFIP MasterClass - FORENSIC INVESTIGATION STEPS AND METHODOLOGY (W12) OnDemand OnDemand Online (OnDemand)
Create a report - Forensics Imaging Self-Paced Online Training (W10) Create a report - Forensics Imaging Self-Paced Online Training (W10) OnDemand OnDemand Online (OnDemand)
Malware Analysis StarterKit (W02) Malware Analysis StarterKit (W02) OnDemand OnDemand Online (OnDemand)
Computer Forensics In Practice Complete Course (W04) Computer Forensics In Practice Complete Course (W04) OnDemand OnDemand Online (OnDemand)
Master Your CSA Star (W03) Master Your CSA Star (W03) OnDemand OnDemand Online (OnDemand)
Packet Analysis with Wireshark and PCAP analysis tools (W01) Packet Analysis with Wireshark and PCAP analysis tools (W01) OnDemand OnDemand Online (OnDemand)
Deepfake Audio: A Comprehensive Study in Digital Forensics Course Online (W62) Deepfake Audio: A Comprehensive Study in Digital Forensics Course Online (W62) OnDemand OnDemand Online (OnDemand)
Micro-drone Warfare: Cybersecurity Implications and Countermeasures (W61) Micro-drone Warfare: Cybersecurity Implications and Countermeasures (W61) OnDemand OnDemand Online (OnDemand)
Data Integrity And Evidence Handling in Digital Forensics - Course Online (W60) Data Integrity And Evidence Handling in Digital Forensics - Course Online (W60) OnDemand OnDemand Online (OnDemand)
eForensics Course for eWarfare: Investigations, Threat Detection and Reconnaissance in the Electromagnetic Spectrum (W59) eForensics Course for eWarfare: Investigations, Threat Detection and Reconnaissance in the Electromagnetic Spectrum (W59) OnDemand OnDemand Online (OnDemand)
Browser Forensics (W57) Browser Forensics (W57) OnDemand OnDemand Online (OnDemand)
Cloud Forensics (W56) Cloud Forensics (W56) OnDemand OnDemand Online (OnDemand)
Windows Forensics (W55) Windows Forensics (W55) OnDemand OnDemand Online (OnDemand)
Natural Language Processing for OSINT & Threat Analysis (W54) Natural Language Processing for OSINT & Threat Analysis (W54) OnDemand OnDemand Online (OnDemand)
IoT Forensics - DVID Challenge (W53) IoT Forensics - DVID Challenge (W53) OnDemand OnDemand Online (OnDemand)
PowerShell in Digital Forensics (W52) PowerShell in Digital Forensics (W52) OnDemand OnDemand Online (OnDemand)
Digital Image Forensics: Lessons in Tampering and Fake Image Detection (W51) Digital Image Forensics: Lessons in Tampering and Fake Image Detection (W51) OnDemand OnDemand Online (OnDemand)
iOS Social Media Forensics (W50) iOS Social Media Forensics (W50) OnDemand OnDemand Online (OnDemand)
Shodan, OSINT & IoT Devices (W49) Shodan, OSINT & IoT Devices (W49) OnDemand OnDemand Online (OnDemand)
Network Monitoring with Security Onion (W48) Network Monitoring with Security Onion (W48) OnDemand OnDemand Online (OnDemand)
Digital Forensic Imaging - Tools & Methods (W47) Digital Forensic Imaging - Tools & Methods (W47) OnDemand OnDemand Online (OnDemand)
Android Mobile Forensics (W46) Android Mobile Forensics (W46) OnDemand OnDemand Online (OnDemand)
Linux Kernel Security (W45) Linux Kernel Security (W45) OnDemand OnDemand Online (OnDemand)
Drone Forensics (W44) Drone Forensics (W44) OnDemand OnDemand Online (OnDemand)
Investigate Cyber Fraud - Real-Life Cases (W43) Investigate Cyber Fraud - Real-Life Cases (W43) OnDemand OnDemand Online (OnDemand)
Open Source Intelligence for Forensics (W41) Open Source Intelligence for Forensics (W41) OnDemand OnDemand Online (OnDemand)
Ubuntu Forensics (W42) Ubuntu Forensics (W42) OnDemand OnDemand Online (OnDemand)
New Technology File System (NTFS) Forensics (W40) New Technology File System (NTFS) Forensics (W40) OnDemand OnDemand Online (OnDemand)
DNS Malware Analysis: A Forensic Approach (W39) DNS Malware Analysis: A Forensic Approach (W39) OnDemand OnDemand Online (OnDemand)
Log files: Attacks & Defenses (W38) Log files: Attacks & Defenses (W38) OnDemand OnDemand Online (OnDemand)
MacOS Anti-Forensics (W37) MacOS Anti-Forensics (W37) OnDemand OnDemand Online (OnDemand)
Fourth Extended File System (EXT4) Forensics (W36) Fourth Extended File System (EXT4) Forensics (W36) OnDemand OnDemand Online (OnDemand)
Recovering virtual machines from lost VMFS partitions (W29) Recovering virtual machines from lost VMFS partitions (W29) OnDemand OnDemand Online (OnDemand)
Introduction to Fusion–Based Digital Visual Media Forensics (W35) Introduction to Fusion–Based Digital Visual Media Forensics (W35) OnDemand OnDemand Online (OnDemand)
Digital Visual Media Anti–Forensics and Counter Anti–Forensics (W34) Digital Visual Media Anti–Forensics and Counter Anti–Forensics (W34) OnDemand OnDemand Online (OnDemand)
How to Be Ready for Forensic Investigations (W33) How to Be Ready for Forensic Investigations (W33) OnDemand OnDemand Online (OnDemand)
Analyzing malicious documents (W32) Analyzing malicious documents (W32) OnDemand OnDemand Online (OnDemand)
Windows Registry and Log Analysis (W31) Windows Registry and Log Analysis (W31) OnDemand OnDemand Online (OnDemand)
Ransomware Forensics (W30) Ransomware Forensics (W30) OnDemand OnDemand Online (OnDemand)
Digital Video Forensics (W28) Digital Video Forensics (W28) OnDemand OnDemand Online (OnDemand)
Forensic analysis for system boundary identification and security (W27) Forensic analysis for system boundary identification and security (W27) OnDemand OnDemand Online (OnDemand)
Windows 10 Live Analysis Using Sysinternals (W26) Windows 10 Live Analysis Using Sysinternals (W26) OnDemand OnDemand Online (OnDemand)
Live Analysis with Rekall (W25) Live Analysis with Rekall (W25) OnDemand OnDemand Online (OnDemand)
Android Malware Analysis (W24) Android Malware Analysis (W24) OnDemand OnDemand Online (OnDemand)
Introduction to eDiscovery (W23) Introduction to eDiscovery (W23) OnDemand OnDemand Online (OnDemand)