Preferred method of contact:

Digital Forensics Tools and Techniques



Course Number



5 Days

PDF Add to WishList

Digital forensics is the practice of recovering and investigating information found in digital devices. In addition to gaining experience in both a Windows and Linux investigative workstation, this training course provides you with the skills equal to an entry-level digital forensic examiner to acquire, analyze, and report information — with exposure to advanced topics, such as live system and mobile forensics.

You Will Learn How To

  • Perform the essential duties of a forensic examiner
  • Prepare for and execute digital forensic investigations on Windows-based systems
  • Apply forensic methodologies to preserve, acquire, extract, and analyse information of investigative importance
  • Identify and analyse key Windows artifacts of investigative importance

Course Outline

  • What is Digital Forensics?

Defining digital forensics

  • Articulating the importance of Locard's Principle
  • Contextualising digital forensics within incident response

Explaining the role of digital forensics in investigations

  • Criminal, civil and intelligence/anti-terrorism investigations
  • Applying the scientific method to investigations

Articulating the role of a digital forensic examiner

  • Maintaining objectivity within investigations
  • Ensuring confidentiality and integrity
  • Evaluating the Legal Landscape

Exploring legal considerations of digital forensics

  • Respecting privacy rights and expectations
  • Addressing and reporting illegal information

Defining and applying privacy principles

  • Outlining the twelve privacy principles
  • Addressing the duty to preserve in eDiscovery
  • Computing Fundamentals, Memory and Storage

Examining the core operational principles of a computer

  • Inspecting hard drive storage and architecture
  • Reviewing the operations of computer memory

Identifying multiple locations of digital evidence within a computer system

  • Investigating alternate data streams
  • Uncovering hidden data with Steganography
  • Configuring the Forensics Lab and Workstation

Determining lab requirements

  • Key components of a digital forensics lab
  • Conducting tool validation

Preparing and configuring a forensic workstation

  • Demonstrating appropriate use of a hardware write-blocker
  • Exploring key features of commercial and open source forensic software (e.g., EnCase, FTK, DD)

Image acquisition

  • Creating bit-for-bit copies of digital evidence
  • Mounting and searching images
  • Handling and Collecting Evidence

Documenting the physical and digital crime scene

  • Conducting crime scene photography
  • Executing triage techniques and methodologies

Managing the chain of custody

  • Bagging and tagging physical evidence
  • Documenting and demonstrating evidence continuity
  • Analysing and Investigating Evidence

Identifying key Windows artefacts

  • Recovering and searching the Windows registry
  • Hibernation files, event logs, prefetch, shellbag and lnk files
  • Password hash extraction and cracking

Performing keyword searching, bookmarking and timeline analysis

  • Developing strategies for effective keyword searching
  • Reconstructing the order of events with timeline analysis

Conducting e-mail, web browser and USB investigations

  • Extracting and recovering deleted data from slack space
  • Tracking user activity and addressing Trojan Defence
  • Performing Mobile Forensics

Safely handling mobile devices during investigations

  • Examining the use of Faraday bags
  • Demonstrating the use of mobile cables and write-blockers

Preserving and acquiring evidence from mobile devices

  • Investigating evidence located within the address book, calendar, mail, apps and SMS
  • Recovering data from SIM cards
  • Conducting Live Memory Forensics

Performing live memory acquisitions

  • Demonstrating the investigative value of live memory analysis on running systems
  • Utilising open-source tools to capture and extract live memory

Analysing memory dumps for investigative information

  • Determining running processes, active network connections and recent commands
  • Identifying hidden processes and Malware
Show complete outline
Show Less

Convenient Ways to Attend This Instructor-Led Course

Hassle-Free Enrolment: No advance payment required to reserve your seat.
Tuition Fee due 30 days after you attend your course.

In the Classroom

Live, Online

Private Team Training

In the Classroom — OR — Live, Online

Tuition Fee — Standard: £2445  

AFTERNOON START: Attend these live courses online via Anyware

7 - 11 Jan ( 5 Days)
2:00 PM - 9:30 PM GMT
New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

11 - 15 Feb ( 5 Days)
2:00 PM - 9:30 PM GMT
Rockville, MD / Online (AnyWare) Rockville, MD / Online (AnyWare) Reserve Your Seat

11 - 15 Mar ( 5 Days)
1:00 PM - 8:30 PM GMT
Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare) Reserve Your Seat

24 - 28 Jun ( 5 Days)
2:00 PM - 9:30 PM BST
New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

12 - 16 Aug ( 5 Days)
2:00 PM - 9:30 PM BST
Rockville, MD / Online (AnyWare) Rockville, MD / Online (AnyWare) Reserve Your Seat

9 - 13 Sep ( 5 Days)
2:00 PM - 9:30 PM BST
Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare) Reserve Your Seat

Guaranteed to Run

When you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time, location — will run. Guaranteed.

Private Team Training

Enroling at least 3 people in this course? Consider bringing this (or any course that can be custom designed) to your preferred location as a private team training.

For details, call 0800 282 353 or Click here »

This event has been added to your cart.

Tuition Fee


In Classroom or



Private Team Training

Contact Us »

Course Tuition Fee Includes:

After-Course Instructor Coaching
When you return to work, you are entitled to schedule a free coaching session with your instructor for help and guidance as you apply your new skills.

Free Course Exam
You can take your Learning Tree course exam on the last day of your course or online any time after class.


Training Hours

Standard class hours:
9:00 a.m. - 4:30 p.m.

Last day class hours:
9:00 a.m. - 3:30 p.m.

Free Course Exam – Last Day:
3:30 p.m. - 4:30 p.m.

Each class day:
Informal discussion with instructor about your projects or areas of special interest:
4:30 p.m. - 5:30 p.m.

AFTERNOON START class hours:
2:00 p.m. - 9:30 p.m.

Last day class hours:
2:00 p.m. - 8:30 p.m.

Free Course Exam – Last Day:
8:30 p.m. - 9:30 p.m.

Each class day:
Informal discussion with instructor about your projects or areas of special interest
9:30 p.m. - 10:30 p.m.

Enhance Your Credentials with Professional Certification

Learning Tree's comprehensive training and exam preparation guarantees that you will gain the knowledge and confidence to achieve professional certification and advance your career.

This course is approved by CompTIA for continuing education units (CEUs). For additional information and to confirm which courses are eligible towards your CompTIA certification, click here.

- ,

Chat Now

Please Choose a Language

Canada - English

Canada - Français