Webinars

ProviderFeaturedTitle
CDFSLinux Webinar 2.0
ADF SolutionsiOS 16 Screenshots: Streamlining Mobile Forensics Investigations
Magnet Forensics[Air]Tag You’re It! – a look through location artifacts generated by Apple’s AirTag, iOS, and macOS devices within the FindMy application.
ADF Solutions A Guide to Mobile Device Investigations for Probation and Parole 
ADF Solutions ADF Digital Forensic Software: New Features
NW3CAirTags and Tracking Technology: Investigative and Legal Perspectives
ADF Solutions All In One Mobile Forensics: ICAC and CSAM Investigations
ADF Solutions All-in-One Field Forensics: Mobile & Computer 
ADF Solutions Anti-Human Trafficking: Get Results On-Scene 
Magnet ForensicsAXIOM Cyber Feature and Functionality Highlights From 2022
Magnet ForensicsAXIOM Feature and Functionality Highlights From 2022
ADF Solutions Benefits of Digital Forensic Triage 
Magnet ForensicsBest Practices for Digital Forensics Workflow Orchestration & Automation
ADF Solutions Best Practices Webinar: ADF Search Profiles
NW3CBitcoin & Cryptocurrency Investigations: Beyond the Basics
NW3CBitcoin 101: What Are Cryptocurrency and Blockchain All About?
Magnet ForensicsBringing Your Investigators and Their Evidence Together with Magnet REVIEW
NW3CClearnet Investigations of Cyber Enabled Fraud
NW3CClosing the Case: Navigating the Courtroom
Magnet ForensicsCollecting Data From Google Workspace
Magnet ForensicsComprehensive Collection of Data for Early Case Assessments using Magnet AXIOM Cyber
NW3CConducting Secure Online Investigations in 2022
ADF Solutions Creating a Specific Search Profile: Zero in on Your Target 
Magnet ForensicsCritical Cybersecurity Practices for Energy Infrastructure
Magnet ForensicsCritical Cybersecurity Practices for Energy Infrastructure – Understanding the Root Cause of Cyberthreats
NW3CCryptocurrency Investigations for Criminal Justice Agents
NW3CCyber Organized Crime
Magnet ForensicsCyber Regulations and the Effects on Financial Services
NW3CDarknet Markets, Forums, and Investigations
NW3CData Validation of Digital Forensic Evidence
ADF Solutions DEI PRO: Tips and Tricks
NW3CDid I Do That? An Introduction to Mobile Device Artifact Research and Testing
Magnet ForensicsDigital Evidence from Social Networking Sites & Smartphone Apps
ADF Solutions Digital Forensic Techniques to Aid Investigation and Victim Satisfaction 
ADF Solutions Digital Forensic Triage with ADF Tools
Magnet ForensicsDigital Forensics and eDiscovery: Where One Stops and the Other Begins
Magnet ForensicsDigital Forensics’ role in e-Discovery
NW3CDigital License Plates Are Here And On The Road
NW3CDiscreet Sources of Digital Evidence: Has Digital CSI Met TSCM?
ADF Solutions Document Your Data Now! Mobile Investigations Your Way! 
ADF Solutions Documenting Digital Evidence with Screenshots
Magnet ForensicsDuty to Preserve, but How?
4DiscoveryeDiscovery & Forensics In The Cloud
Magnet ForensicsEncore: Get More out of Your Warrant Returns with Magnet AXIOM
NW3CEncrypted Communication Platforms
Magnet ForensicsForensic Readiness: A Panacea to Successful Incident Response
Magnet ForensicsFormat Matters: DD Outperform E01s for DVR Hard Drives
4DiscoveryHow Modern Employees Steal Company Data
NW3CHuman Trafficking 101: A Primer for Prosecutors and Investigators
ADF Solutions ICAC Triage Made Easy 
NW3CICAC UC Chat Techniques Tips and Tricks
Magnet ForensicsIntegrate, Automate, and Scale DFIR Investigations With Magnet AUTOMATE Enterprise
ADF Solutions Intro to DEI: Digital Evidence Investigator® 
ADF Solutions Intro to Mobile & Computer Triage with ADF Digital Forensic Tools 
ADF Solutions Intro to Triage-G2 with Rosoka Entity Extraction & Gisting 
ADF Solutions Introducing Mobile Preview: On-Scene Mobile Triage 
Magnet ForensicsIntroduction to Comae Memory Queries
ADF Solutions Introduction to DEI PRO
ADF Solutions Introduction to DEI PRO Field Tablet 
Magnet ForensicsIntroduction to Magnet AXIOM
Magnet ForensicsInvestigate Malware & Ransomware with Speed and Efficiency
ADF Solutions Investigating Child Exploitation Cases 
ADF Solutions Investigating CSAM with Age Group Recognition 
Magnet ForensicsLearnings from Real World Cloud Data Breaches
Magnet ForensicsLeveraging AXIOM Cyber to Accelerate Corporate Investigations
Magnet ForensicsLeveraging Magnet Forensics Tools to Optimize Your Investigative Workflow 
NW3CLeveraging Open Source Intelligence to Investigate Fraud Rings
Magnet ForensicsMagnet REVIEW: Collaborate on Digital Evidence Review from Anywhere
NW3CMalware as a Service
NW3CMetaverse, Web3, and Blockchain - Security Observations
ADF Solutions Mobile Forensics: Telling the Story with Screenshots and Screen Recording
Magnet ForensicsMobile Unpacked // Breaking Down the Biomes
Magnet ForensicsMobile Unpacked // Rethinking Mobile Forensics
Magnet ForensicsMobile Unpacked // The Meaning of Messages
ADF Solutions New features: Enhanced Mac Forensics with DEI PRO
Magnet ForensicsOffline iOS Tracking and Remote Wiping
NW3COverview of IoT for Investigators and Examiners: What's in Your Toolkit?
Magnet ForensicsPowerShell Tools for IR Forensics Collection
ADF Solutions Protecting Victims: How to Reduce Your Forensic Backlog 
Magnet ForensicsPutting Your DFIR Lab in the Cloud: Lessons Learned
Magnet ForensicsRAM is King: Analyzing RAM in AXIOM and AXIOM Cyber
NW3CReconstructing User Activities from a Memory Dump
ADF Solutions Record what the Suspect or Witness Sees
Magnet ForensicsRespond to Security Events Faster with the Magnet Forensics Product Ecosystem
Magnet ForensicsRoundtable: How Can We Share Digital Evidence Most Effectively?
NW3CSearching for the Digital Evidence in Your Physical Crime Scene: Part 1
NW3CSearching for the Digital Evidence in Your Physical Crime Scene: Part 2
SANSSecuring Your Future in DFIR
Magnet ForensicsSlacking on insider threats? Investigative and monitoring approaches to use within Slack to locate bad actors
NW3CSocial Media and Online Investigations: Identifying Unknown Individuals
ADF Solutions Solving Corporate Investigations in a Digital World 
ADF Solutions Solving Financial Crimes
ADF Solutions Solving Fraud & Economic Crimes with ADF PRO tools 
ADF Solutions Solving Human Trafficking Investigations On-Scene
ADF Solutions Speed Digital Investigations Involving Multimedia
Magnet ForensicsTesla Forensics – The Wheels Are There So the Computers Don’t Drag On the Ground
Magnet ForensicsThe Basics of Digital Image and Video Compression 
ADF Solutions The Best Smartphone Forensics
Magnet ForensicsTiming is Everything: What You Need to Know About DVR Dates & Times
Magnet ForensicsTips & Tricks // Accessing VirusTotal’s Cyberthreat Insights in Magnet AXIOM Cyber
Magnet ForensicsTips & Tricks // Acquiring Data from the Cloud
Magnet ForensicsTips & Tricks // Acquiring WhatsApp Data: There’s More Than One Way to Get the Data
Magnet ForensicsTips & Tricks // Building Streamlined Digital Forensics Workflows with Magnet AUTOMATE
Magnet ForensicsTips & Tricks // Customizing Magnet AXIOM for Your Investigations
Magnet ForensicsTips & Tricks // Get To Evidence Faster in DVR Examiner
Magnet ForensicsTips & Tricks // Get to Evidence Faster with Media Explorer
Magnet ForensicsTips & Tricks // Ingesting Mobile Extractions into AXIOM
Magnet ForensicsTips & Tricks // Instantly Search and Filter a Target Endpoint with AXIOM Cyber
Magnet ForensicsTips & Tricks // Investigating Linux Instances With AXIOM & AXIOM Cyber
Magnet ForensicsTips & Tricks // Jumpstart Your IR Investigations with YARA Rules
Magnet ForensicsTips & Tricks // Putting Geolocation Data on the Map
Magnet ForensicsTips & Tricks// A New Yet Familiar Look at Email Evidence in AXIOM Cyber
Magnet ForensicsTop Cyber Threats to Financial Services & How to Rapidly Investigate with Digital Forensic Solutions
ADF Solutions Understanding Search Profiles To Solve Cases Faster
NW3CUnderstanding the Dark Web
NW3CUsing Video Technology to Solve Crimes
Magnet ForensicsVehicle Forensics: The Road to Success!
NW3CWhat ICAC Investigators Need to Know about Hiding on the Internet: Proxies and VPNs
NW3CWhat ICAC Investigators Need to Know about Hiding on the Internet: Tor, Darknets, & Dark Markets
Magnet ForensicsWhat’s New in Magnet AUTOMATE 3.0
Magnet ForensicsWhy Cyber is Critical in Healthcare