Digital Investigations - Advanced Training Course
In this course, you will learn the principles and techniques for digital forensics investigation and the spectrum of available computer forensics tools. You will learn about core forensics procedures to ensure court admissibility of evidence, as well as the legal and ethical implications.
You will learn how to perform a forensic investigation on both Unix/Linux and Windows systems with different file systems. with many advanced topics like wireless, network, web, DB and Mobile crimes investigation
Course Outline
At the end of this course you will be able to demonstrate knowledge and understanding of:
- Forensics Investigation Process
- Use Guidance Encase and FTK Access Data
- Cryptography, Steganography, Media Files Forensic techniques
- Password Cracking
- Investigating Wireless Attacks
- Investigating Web Applications Attacks
- Investigating Web Servers Attacks
- Investigating Database Servers Attacks
- Investigating Email Crimes
- Investigating Mobile Applications Crimes
Requirements
Work experience in an IT or IT-related role
Attend Digital Forensic Investigation - Introduction
Open Training Courses require 5+ participants.
Digital Investigations - Advanced Training Course - Booking
Digital Investigations - Advanced Training Course - Enquiry
NobleProg offers professional training programs designed specifically for companies and organizations. These trainings are not intended for individuals.
Digital Investigations - Advanced - Consultancy Enquiry
Testimonials (2)
Clarity and pace of explanations
Federica Galeazzi - Aethra Telecomunications SRL
Course - AI-Powered Cybersecurity: Advanced Threat Detection & Response
It did give me the insight what I needed :) I am starting teaching on a BTEC Level 3 qualification and wanted to widen my knowledge in this area.
Otilia Pasareti - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
Upcoming Courses
Related Courses
AI-Powered Cybersecurity: Threat Detection & Response
21 HoursThis instructor-led, live training in France (online or onsite) is aimed at beginner-level cybersecurity professionals who wish to learn how to leverage AI for improved threat detection and response capabilities.
By the end of this training, participants will be able to:
- Understand AI applications in cybersecurity.
- Implement AI algorithms for threat detection.
- Automate incident response with AI tools.
- Integrate AI into existing cybersecurity infrastructure.
AI-Powered Cybersecurity: Advanced Threat Detection & Response
28 HoursThis instructor-led, live training in France (online or onsite) is designed for intermediate to advanced cybersecurity professionals seeking to enhance their skills in AI-driven threat detection and incident response.
Upon completion of this training, participants will be able to:
- Deploy advanced AI algorithms for real-time threat detection.
- Customize AI models to address specific cybersecurity challenges.
- Create automation workflows for threat response.
- Protect AI-driven security tools from adversarial attacks.
Blue Team Fundamentals: Security Operations and Analysis
21 HoursThis instructor-led, live training in France (online or onsite) is aimed at intermediate-level IT security professionals who wish to develop skills in security monitoring, analysis, and response.
By the end of this training, participants will be able to:
- Understand the role of a Blue Team in cybersecurity operations.
- Use SIEM tools for security monitoring and log analysis.
- Detect, analyze, and respond to security incidents.
- Perform network traffic analysis and threat intelligence gathering.
- Apply best practices in security operations center (SOC) workflows.
Bug Bounty Hunting
21 HoursBug Bounty Hunting involves identifying security weaknesses within software, websites, or systems, and responsibly reporting these findings to earn rewards or recognition.
This instructor-led live training, available online or onsite, targets beginner-level security researchers, developers, and IT professionals seeking to master the fundamentals of ethical bug hunting and effectively participate in bug bounty programs.
Upon completion of this training, participants will be able to:
- Grasp the core concepts of vulnerability discovery and bug bounty programs.
- Leverage essential tools such as Burp Suite and browser developer tools for application testing.
- Detect common web security flaws, including XSS, SQLi, and CSRF.
- Submit clear, actionable vulnerability reports to bug bounty platforms.
Course Format
- Interactive lectures and discussions.
- Hands-on practice with bug bounty tools in simulated testing environments.
- Guided exercises focused on discovering, exploiting, and reporting vulnerabilities.
Customization Options
- To arrange customized training tailored to your organization's applications or testing requirements, please contact us.
Bug Bounty: Advanced Techniques and Automation
21 HoursBug Bounty: Advanced Techniques and Automation provides an in-depth exploration of high-impact vulnerabilities, automation frameworks, reconnaissance methodologies, and the strategic tooling employed by top-tier bug bounty hunters.
This instructor-led live training, available online or onsite, is designed for intermediate to advanced security researchers, penetration testers, and bug bounty hunters aiming to streamline their workflows, expand reconnaissance capabilities, and identify complex vulnerabilities across diverse targets.
Upon completion of this training, participants will be capable of:
- Automating reconnaissance and scanning processes for multiple targets.
- Utilizing state-of-the-art tools and scripts specific to bounty automation.
- Uncovering complex, logic-based vulnerabilities that extend beyond standard scanning capabilities.
- Developing custom workflows for subdomain enumeration, fuzzing, and reporting.
Course Format
- Interactive lectures and discussions.
- Practical application of advanced tools and scripting for automation.
- Guided labs centered on real-world bounty workflows and sophisticated attack chains.
Customization Options
- For customized training tailored to your specific bounty targets, automation requirements, or internal security challenges, please contact us to arrange a session.
Cyber Defence (SOC) Analyst Foundation
7 HoursThis instructor-led, live training in France (online or onsite) is designed for beginner to intermediate-level security analysts and system administrators who wish to establish a foundational understanding of Cyber Defence (SOC) analysis.
By the end of this training, participants will be able to:
- Understand the principles of Security Management in a Cyber Defence context.
- Execute effective Incident Response strategies to mitigate security incidents.
- Implement Security Education practices to enhance organizational awareness and preparedness.
- Manage and analyze Security Information for proactive threat identification.
- Utilize Event Management techniques to monitor and respond to security events.
- Implement Vulnerability Management processes to identify and address system vulnerabilities.
- Develop skills in Threat Detection to identify and respond to potential cyber threats.
- Participate in Simulated Attacks to test and improve incident response capabilities.
CHFI - Certified Digital Forensics Examiner
35 HoursThe vendor-neutral Certified Digital Forensics Examiner certification is designed to equip Cyber Crime and Fraud Investigators with skills in electronic discovery and advanced investigative methodologies. This course is essential for anyone involved in handling digital evidence during an investigation.
The Certified Digital Forensics Examiner training provides the methodology for conducting computer forensic examinations. Participants will learn to apply forensically sound investigative techniques to evaluate the scene, collect and document all relevant data, interview appropriate personnel, maintain the chain of custody, and draft a comprehensive findings report.
The Certified Digital Forensics Examiner course benefits organizations, individuals, government agencies, and law enforcement entities seeking to pursue litigation, prove guilt, or implement corrective actions based on digital evidence.
Certified Incident Handler
21 HoursThe Certified Incident Handler course delivers a structured methodology for managing and responding to cybersecurity incidents with both effectiveness and efficiency.
This instructor-led training, available either online or onsite, is designed for intermediate-level IT security professionals seeking to acquire the tactical skills and knowledge necessary to plan, classify, contain, and manage security incidents.
Upon completion of this training, participants will be capable of:
- Comprehending the incident response lifecycle and its various phases.
- Executing procedures for incident detection, classification, and notification.
- Implementing containment, eradication, and recovery strategies effectively.
- Creating post-incident reports and plans for continuous improvement.
Course Format
- Interactive lectures and discussions.
- Practical application of incident handling procedures within simulated scenarios.
- Guided exercises focusing on detection, containment, and response workflows.
Course Customization Options
- To arrange customized training tailored to your organization's specific incident response procedures or tools, please contact us.
Mastering Continuous Threat Exposure Management (CTEM)
28 HoursThis instructor-led, live training in France (online or onsite) targets intermediate-level cybersecurity professionals who wish to implement CTEM in their organizations.
By the end of this training, participants will be able to:
- Understand the principles and stages of CTEM.
- Identify and prioritize risks using CTEM methodologies.
- Integrate CTEM practices into existing security protocols.
- Utilize tools and technologies for continuous threat management.
- Develop strategies to validate and improve security measures continuously.
Cyber Emergency Response Team (CERT)
7 HoursThis course explores the management of an incident response team. Given the frequency and complexity of contemporary cyber attacks, the role of the first responder is critical, making incident response a vital function for organizations.
As the last line of defense, effective incident response relies on robust detection and efficient handling processes. Successfully managing an incident response team demands specialized skills and in-depth knowledge.
Cyber Threat Intelligence
35 HoursThis instructor-led, live training in France (online or onsite) targets advanced cybersecurity professionals eager to understand Cyber Threat Intelligence and develop the skills to effectively manage and mitigate cyber threats.
By the end of this training, participants will be able to:
- Understand the fundamentals of Cyber Threat Intelligence (CTI).
- Analyze the current cyber threat landscape.
- Collect and process intelligence data.
- Perform advanced threat analysis.
- Leverage Threat Intelligence Platforms (TIPs) and automate threat intelligence processes.
Fundamentals of Corporate Cyber Warfare
14 HoursThis instructor-led, live training in France (online or onsite) explores various dimensions of enterprise security, ranging from artificial intelligence to database protection. The curriculum also addresses the essential tools, methodologies, and mindsets necessary to defend against cyber attacks.
DeepSeek for Cybersecurity and Threat Detection
14 HoursThis instructor-led, live training in France (online or onsite) is aimed at intermediate-level cybersecurity professionals who wish to leverage DeepSeek for advanced threat detection and automation.
By the end of this training, participants will be able to:
- Utilize DeepSeek AI for real-time threat detection and analysis.
- Implement AI-driven anomaly detection techniques.
- Automate security monitoring and response using DeepSeek.
- Integrate DeepSeek into existing cybersecurity frameworks.
Ethical Hacker
35 HoursThis course immerses students in an interactive learning environment where they are guided through the processes of scanning, testing, hacking, and securing their own systems. The lab-intensive setting provides each student with in-depth knowledge and practical experience with essential current security systems. Students start by understanding how perimeter defenses function and are then guided into scanning and attacking their own networks, ensuring no real networks are harmed. They learn how intruders escalate privileges and the steps required to secure a system. Additionally, students cover Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation. Upon completion of this intensive 5-day class, students will have hands-on understanding and experience in Ethical Hacking.
The purpose of the Ethical Hacking Training is to:
- Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
- Inform the public that credentialed individuals meet or exceed the minimum standards.
- Reinforce ethical hacking as a unique and self-regulating profession.
Audience:
The course is ideal for those working in positions such as, but not limited to:
- Security Engineers
- Security Consultants
- Security Managers
- IT Director/Managers
- Security Auditors
- IT Systems Administrators
- IT Network Administrators
- Network Architects
- Developers
MasterClass Certified Ethical Hacker Program
28 HoursThe Certified Ethical Hacker certification is a globally recognized and highly sought-after credential in the cybersecurity industry.
This comprehensive program combines theoretical instruction with practical exercises to prepare students for both the CEH certification exam and the CEH Practical Exam. Candidates who successfully pass both examinations earn the prestigious CEH Master credential alongside their CEH certification.
Participants have the option to enhance their learning package by choosing either the CPENT or the CHFI course.
Training for either the Certified Penetration Testing Professional (CPENT) course or the Computer Hacking Forensic Investigator (CHFI) course is delivered to each student through EC-Council’s online, self-paced streaming video platform.
CPENT (Penetration Testing):
This module teaches students how to apply the concepts and tools learned in the CEH program to a penetration testing methodology within a live cyber range environment.
CHFI (Computer Forensics):
This module instructs students on a methodological approach to computer forensics, covering processes such as searching and seizing, chain-of-custody management, acquisition, preservation, analysis, and reporting of digital evidence.
Course Description
CEH provides an in-depth understanding of the phases of ethical hacking, various attack vectors, and preventative countermeasures. It teaches you to think and act like a hacker, enabling you to better design your security infrastructure and defend against future attacks. By understanding system weaknesses and vulnerabilities, organizations can strengthen their security controls to minimize the risk of security incidents.
CEH is designed to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, offering you the opportunity to demonstrate the required knowledge and skills to achieve the CEH credential. You will be exposed to a completely different perspective on the responsibilities and measures required to maintain security.
Who Should Attend
- Law enforcement personnel
- System administrators
- Security officers
- Defense and military personnel
- Legal professionals
- Bankers
- Security professionals
About the Certified Ethical Hacker Master
To earn the CEH Master certification, you must pass the CEH Practical exam. This exam was designed to give students the opportunity to prove they can execute the principles taught in the CEH course. The practical exam requires you to demonstrate the application of ethical hacking techniques, including threat vector identification, network scanning, OS detection, vulnerability analysis, system hacking, and more.
The CEH Practical exam does not rely on simulations. Instead, you will challenge a live environment designed to mimic a corporate network using live virtual machines, networks, and applications.
Successfully completing the challenges in the CEH Practical Exam is the next step after attaining the Certified Ethical Hacker (CEH) certification. Passing both the CEH exam and the CEH Practical Exam earns you the additional CEH Master certification.
About the Certified Ethical Hacker Practical
To prove your proficiency in ethical hacking, your abilities are tested with real-world challenges in a realistic environment. Labs and tools are used to require you to complete specific ethical hacking challenges within a time limit, mirroring the pressure of real-world scenarios.
The EC-Council CEH (Practical) exam features a complex network that replicates a large organization’s real-life network, consisting of various network systems (including DMZ, Firewalls, etc.). You must apply your ethical hacking skills to discover and exploit real-time vulnerabilities while also auditing the systems.
About CPENT
EC-Council’s Certified Penetration Tester (CPENT) program focuses on penetration testing, teaching you to operate in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only worked with flat networks, CPENT’s live practice range will elevate your skills by teaching you to penetration test IoT and OT systems, write your own exploits, build custom tools, conduct advanced binary exploitation, perform double pivots to access hidden networks, and customize scripts and exploits to infiltrate the innermost segments of the network.
About CHFI
The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios, enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools required to successfully conduct a computer forensic investigation.