1. protectaccount

    IT & Software TCM SECURITY – Practical Windows Forensics 2022

    The objective of this course is to show students how to perform a full digital forensic investigation of a Windows system in a complete DYI setup. The course covers a full digital forensic investigation of a Windows system. It begins with the simple preparation of our lab, which consists of...
  2. protectaccount

    IT & Software Computer Hacking and Forensics | Cybrary

    Course Description Welcome to the Computer Hacking and Forensics course! Progress is a nice word. But change is its motivator. And change has its enemies.” – Robert Kennedy Welcome to Cybrary’s computer forensics training course! Industry change is here, traditionally, computer forensics...
  3. SxxNGx

    Other Anti Forensics Free Course

    Unlock the secrets of Anti-Forensics: Dive deep into advanced techniques to protect your digital identity, ensure privacy, and remain undetected. This course is a must-have for those seeking to elevate their cybersecurity skills to the next level Link: *** Hidden text: You do not have sufficient...
  4. protectaccount

    IT & Software Incident Response and Advanced Forensics Cybrary

    In this course, you will gain an introduction to Incident Response, learn how to develop three important protection plans, perform advanced forensics on the incident, deep dive into insider and malware threats, and commence incident recovery. Link: *** Hidden text: You do not have sufficient...
  5. protectaccount

    IT & Software Mobile Forensics Fundamentals | Infosec

    The content of the learning path is divided into Courses corresponding to four domains of Mobile Forensics. The Courses focus on the foundation topics within the domains. Each Course has streaming content for the designated topics. Link: *** Hidden text: You do not have sufficient rights to...
  6. protectaccount

    IT & Software Incident Response and Advanced Forensics | Cybrary

    In this course, you will gain an introduction to Incident Response, learn how to develop three important protection plans, perform advanced forensics on the incident, deep dive into insider and malware threats, and commence incident recovery. Link: *** Hidden text: You do not have sufficient...
  7. protectaccount

    IT & Software Windows Forensics and Tools | Cybrary

    The Windows Forensics and Tools course focuses on building digital forensics knowledge of Microsoft Windows operating systems, as well as some compatible software or tools that can be used to obtain or process information in such systems. Link: *** Hidden text: You do not have sufficient rights...
  8. protectaccount

    IT & Software TCM Security - Practical Windows Forensics

    The objective of this course is to show students how to perform a full digital forensic investigation of a Windows system in a complete DIY setup. The course covers a full digital forensic investigation of a Windows system. It begins with the simple preparation of our lab, which consists of...
  9. protectaccount

    IT & Software Belkasoft - Master Digital Forensics Tools and Skills

    his advanced course is designed for digital forensics professionals looking to enhance their expertise beyond foundational skills. It delves into sophisticated forensic methods, including advanced file system analysis, memory forensics, network traffic analysis, and reverse engineering...
  10. protectaccount

    IT & Software Computer Forensics as a Profession | Infosec

    Learn what it’s like to be a computer forensics professional in this introductory course covering duties, procedures and practical advice. At the bottom of it, forensics is the job of proving or disproving a theory in a reproducible manner. Take a closer look at the nitty-gritty of computer...
  11. protectaccount

    IT & Software Infosec – Introduction to Mobile Forensics

    Get an introduction to mobile forensics and the challenges mobile devices present to investigators in this overview course. Mobile phone technology is one of the most rapidly evolving areas in tech today, and that makes investigating it a challenge. Our four-video course takes a closer look at...
  12. protectaccount

    IT & Software Web Forensics: Recovering Digital Evidence

    As the internet becomes more and more integral in our lives, so does the need to investigate criminal activity on the web. It’s more important than ever for digital forensics professionals to acquire expertise to solve cybercrimes occurring on the web. This course provides the theory and...
  13. protectaccount

    IT & Software MalTrak – Basic Digital Forensics

    A foundational training program focused on the core principles and practical skills of digital forensics – geared toward those entering the field or strengthening basic investigative capabilities. Syllabus: Basic Digital Forensics Part 1 Basic Digital Forensics Part 2 Link: *** Hidden text...
  14. protectaccount

    IT & Software ECDFP – Digital Forensics Professional 2021 INE Version

    The eLearnSecurity Certified Digital Forensics Professional (eCDFP) is an advanced digital forensics exam meant for senior-level cyber security professionals. A successful certification allows digital forensics investigators to prove their technical digital forensics expertise. Here are some...
  15. protectaccount

    IT & Software Grzegorz Tworek – Mastering Windows Forensics

    Mastering Windows Forensics empowers cybersecurity professionals and digital investigators to uncover compelling evidence on Windows systems. Curated by Grzegorz Tworek, this course delivers targeted instruction on interpreting attack vectors, enhancing forensic analysis, and strengthening...
  16. protectaccount

    IT & Software Belkasoft – Windows Forensics with Belkasoft

    This course is designed for digital forensics investigators who deal with Windows computers in their work. It offers an opportunity to enhance your knowledge and gain hands-on experience in discovering and analyzing Windows artifacts. Syllabus: Getting started Windows file systems Reviewing...
  17. protectaccount

    Udemy Cyber Security & Digital Forensics : From Beginner to Expert

    Analyze traces on Windows, Linux, and macOS, file systems like NTFS, Ext, APFS, and understand encryption and malware. What you’ll learn: Digital Forensics Basics: Tasks, requirements, and methods for securing and analyzing digital evidence. Essential hardware and software knowledge. DIN EN...
  18. protectaccount

    IT & Software Operating System Forensics

    Criminals rely on the intricacies of operating systems like Windows, macOS, and Linux to conceal their activities and hide data. However, a skilled digital forensics expert knows the places to look and the tools to use to access evidence of their crimes. This course covers all the major concepts...
  19. protectaccount

    Udemy Learning Computer Forensics With Infinite Skills

    This video based Computer Forensics training course from Infinite Skills will teach you how to get started in this industry. Computer Forensics is a broad topic that touches on many different skills, all specific to answering legal or investigative questions in relation to a computer. This...
  20. protectaccount

    Udemy Malware Forensics v5:AI &ChatGPT Mastery in Malware Analysis

    Dive into the intricate and ever-evolving domain of malware forensics with “Malware Forensics v5: AI & ChatGPT Mastery in Malware Analysis,” a pioneering course crafted to arm you with the advanced knowledge and skills essential for mastering the latest cybersecurity challenges. This course...
  21. protectaccount

    Udemy AML Forensics in Crypto: Hackers’ Laundering Blueprints

    What if I told you that in the modern world there are whole business lines in which some people earn huge fortunes by making up such complex schemes that are not at all easy to analyze, and sometimes impossible. What pops into your head when you hear the word blockchain? A chain of linked...
  22. protectaccount

    IT & Software Cybersecurity Foundations: Computer Forensics

    Computer forensics is used to find legal evidence in computers, mobile devices, or data storage units. This course covers all the technical essentials for up-and-coming digital forensics professionals. Instructor Jungwoo Ryoo reviews the goals of computer forensics, the types of investigations...
  23. protectaccount

    IT & Software Specialized DFIR: Windows Event Log Forensics

    Windows event logs contain lots of information that assist investigations in determining what happened on a system. However, some of this information is hidden within the multitude of event logs on a system. In this course, Specialized DFIR: Windows Event Log Forensics, you’ll learn how to focus...
  24. protectaccount

    Udemy Courses Malware Forensics v1:Static & Cloud Malware Analysis Mastery

    Embark on a comprehensive journey into the world of malware forensics with our expertly crafted course, “Malware Forensics v1: Static & Cloud Malware Analysis Mastery.” This course is meticulously designed to equip you with the knowledge and skills necessary to navigate the complex and evolving...
  25. Deadpool

    Windows 4n6 Software Email Forensics Wizard - v7.6 - 08/08/2025 - Windows Cracked

    <----------------------------------------> 4n6 Software Email Forensics Wizard Version 7.6 PlatformWindows Version7.6 Size84.1 MB Updated08/08/2025 Overview Experts recommended Email File Forensic Software for deep analysis and examination of emails. Screenshots Download Reply...
  26. protectaccount

    Udemy Mastering Digital Forensics Essentials

    The Mastering Digital Forensics Essentials specialization is designed to equip learners with a comprehensive, practical, and ethically grounded understanding of modern digital forensics principles, investigative methodologies, and forensic toolkits. Through this program, participants will gain...
  27. protectaccount

    Udemy Learning Cyber Incident Response and Digital Forensics

    If your organization is the victim of a cyberattack, are you ready to respond? In this course, cybersecurity trainer Jason Dion guides you through the basics of how to conduct an incident response, including how evidence is collected for further digital forensic investigation. Jason explains...
  28. E

    Mobile device forensics

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  29. TmillonN

    Udemy Computer Forensics and Digital Forensics Masterclass PRO+

    Computer Forensics and Digital Forensics Masterclass PRO+ Learn computer forensics, digital forensics, mobile forensics, windows forensics, linux forensics and other forensics. This is the most comprehensive, yet straight-forward, course for the Digital Forensics and Computer Forensics on...
  30. TmillonN

    Udemy Digital Forensics Masterclass :Computer Forensics DFMC+ DFIR

    Digital Forensics Masterclass :Computer Forensics DFMC+ DFIR Learn digital forensics and be computer forensics investigator / Certificate after completing course / DFMC+ / DFIR 2025 Become a Digital Forensics Investigator and learn one of most requested skills of 2025! This is the most...
  31. baladia

    IT & Software Cybersecurity Foundations: Computer Forensics

    Cybersecurity Foundations: Computer Forensics Released: 12/18/2023 Duration: 2h 40m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 505 MB Genre: eLearning | Language: English [/center] Computer forensics is used to find legal evidence in computers, mobile devices, or data storage units...
  32. mayoufi

    NetWork Forensics (2024)

    eleased: 11/25/2024 Duration: 1h 59m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 280 MB Genre: eLearning | Language: English Network forensics is used to find legal evidence in network devices. This course covers all the major concepts and tools of this growing (and exciting) technical...
  33. rundutproject

    Malware Forensics V4 - Ai and Chatgpt Mastery In Malware Analysis 2024

    Overview Malware forensics is a crucial field in cybersecurity, focusing on the detection, analysis, and mitigation of malicious software. The evolving landscape of cyber threats necessitates advanced tools and methodologies for effective malware analysis. The fourth version of Malware...
  34. lovewarez

    Wireshark: Malware and Forensics

    Wireshark: Malware and Forensics Duration: 1h 59m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 358 MB Level: Intermediate | Genre: eLearning | Language: English Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as...
  35. tronny

    Udemy - CyberPatriot 5-2023, by Stone River eLearning

    Udemy - CyberPatriot 5-2023, by Stone River eLearning *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  36. tronny

    CBTNuggets - Introduction to Digital Forensics Online Training 1-2023

    CBTNuggets - Introduction to Digital Forensics Online Training 1-2023, by Erik Choron *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  37. Forbes808

    Leaked paid course: Malware Forensics v5

    Malware Forensics v5: AI & ChatGPT Mastery in Malware Analysis Source: https://www.udemy.com/course/malware-forensics-v5ai-chatgpt-mastery-in-malware-analysis/?couponCode=ST6MT42324 Download Link: https://mega.nz/folder/JzdiAAqI#chaPzhcGj9RwRzwG9STqLQ
  38. carxproveteran

    The Art of CHFI (Practice Tests only) Hands-On 2024 journey

    The Art of CHFI (Practice Tests only) Hands-On 2024 journey Master digital forensics with (CHFI Practice Tests) of exploring cybercrime landscapes, and securing CHFI certification What you'll learn Mastering CHFI Techniques: Gain proficiency in digital forensics, analyzing and responding to...
  39. r32

    Computer Forensics Specialization

    Link: https://elhacker.info/Cursos/Computer%20Forensics%20Specialization/
  40. tronny

    AntisyphonTraining - Linux Forensics w Hal Pomeranz - 2023

    AntisyphonTraining - Linux Forensics w Hal Pomeranz - 2023 v3.0.2 (Lab VM, Exercises, PDF, & Videos) *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  41. tronny

    OrhanErgun - Digital Forensics & Incident Response Pro

    OrhanErgun - Digital Forensics & Incident Response Pro *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  42. tronny

    Pluralsight - Live Response and Forensics with PowerShell, by Liam Cleary

    Pluralsight - Live Response and Forensics with PowerShell, by Liam Cleary *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  43. tronny

    Udemy - Mastering Digital Forensics eDiscovery for Investigations

    Udemy - Mastering Digital Forensics eDiscovery for Investigations 3-2024, by Financial Crime Academy *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  44. tronny

    Udemy - Malware Forensics Mastery v3 AI Advanced Predict & Analysis

    Udemy - Malware Forensics Mastery v3 AI Advanced Predict & Analysis 1-2024, by Dharmanandana Reddy Pothula *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  45. tronny

    AntisyphonTraining - Course Linux Forensics w Hal Pomeranz

    AntisyphonTraining - Course Linux Forensics w Hal Pomeranz *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  46. lovewarez

    Mastering Digital Forensics & Ediscovery For Investigations

    Mastering Digital Forensics & Ediscovery For Investigations Published 3/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 1.65 GB | Duration: 2h 28m Learn Key Aspects of how Digital Forensic, Cyber Forensics and eDiscovery Methods are applied in Internal...
  47. tronny

    InfosecInstitute - Windows Registry Forensics

    InfosecInstitute - Windows Registry Forensics *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  48. tronny

    InfosecInstitute - Network Forensics

    InfosecInstitute - Network Forensics *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  49. tronny

    InfosecInstitute - Computer Forensics

    InfosecInstitute - Computer Forensics *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  50. tronny

    AntisyphonTraining - Enterprise forensics and response, by Gerry Johansen

    AntisyphonTraining - Enterprise forensics and response, by Gerry Johansen *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Top Bottom