Cyber Security Training Catalog – Forensic Investigator Intermediate

Overview:  This course continues teaching students about being a forensic investigator. Topics covered include data and forensics, malware and analysis, database forensics, andnetwork and email forensics.

Course Modules:

Module 01 – Data and Forensics

(Duration: 1h 17m)

  1. Workbook (Pdf)
  2. Topic A: Windows Volatile Data – Part 1
  3. Windows Volatile Data – Part 2
  4. Windows Volatile Data – Part 3
  5. Topic B: Windows Non-Volatile Data – Part 1
  6. Windows Non-Volatile Data – Part 2
  7. Windows Non-Volatile Data – Part 3
  8. Topic C: Linux Forensics – Part 1
  9. Linux Forensics – Part 2
  10. Linux Forensics – Part 3
  11. Topic D: Mac Forensics – Part 1
  12. Mac Forensics – Part 2
  13. Mac Forensics – Part 3
  14. Review Quiz (Number of attempts allowed: Unlimited)

Module 03 – Database Forensics

(Duration: 53m)

  1. Workbook (Pdf)
  2. Topic A: Database Forensics – Part 1
  3. Database Forensics – Part 2
  4. Database Forensics – Part 3
  5. Topic B: Oracle – Part 1
  6. Oracle – Part 2
  7. Oracle – Part 3
  8. Topic C: MySQL – Part 1
  9. MySQL – Part 2
  10. MySQL – Part 3
  11. Topic D: Microsoft SQL Server – Part 1
  12. Microsoft SQL Server – Part 2
  13. Microsoft SQL Server – Part 3
  14. Review Quiz (Number of
  15. attempts allowed: Unlimited)

Module 02 – Malware and Analysis

(Duration: 58m)

  1. Workbook (Pdf)
  2. Topic A: Malware – Part 1
  3. Malware – Part 2
  4. Malware – Part 3
  5. Topic B: Static Analysis – Part 1
  6. Static Analysis – Part 2
  7. Static Analysis – Part 3
  8. Topic C: Dynamic Analysis – Part 1
  9. Dynamic Analysis – Part 2
  10. Dynamic Analysis – Part 3
  11. Review Quiz (Number of attempts allowed: Unlimited)

Module 04 – Network and Email Forensics

(Duration: 1h 39m)

  1. Workbook (Pdf)
  2. Topic A: Network Review- Part 1
  3. Network Review- Part 2
  4. Network Review- Part 3
  5. Topic B: Network Forensics- Part 1
  6. Network Forensics- Part 2
  7. Network Forensics- Part 3
  8. Topic C: Firewall Analysis- Part 1
  9. Firewall Analysis- Part 2
  10. Firewall Analysis- Part 3
  11. Topic D: IDS Analysis- Part 1
  12. IDS Analysis- Part 2
  13. IDS Analysis- Part 3
  14. Topic E: Router Analysis- Part 1
  15. Router Analysis- Part 2
  16. Router Analysis- Part 3
  17. Topic F: Live Analysis- Part 1
  18. Live Analysis- Part 2
  19. Live Analysis- Part 3
  20. Topic G: Email Review- Part 1
  21. Email Review- Part 2
  22. Email Review- Part 3
  23. Topic H: Email Crimes- Part 1
  24. Email Crimes- Part 2
  25. Email Crimes- Part 3
  26. Topic I: Email Analysis- Part 1
  27. Email Analysis- Part 2
  28. Email Analysis- Part 3
  29. Review Quiz (Number of attempts allowed: Unlimited)

Training Final Exam ?

Are you ready to earn your certificate of completion?

Launch The Exam

This course includes
  • about 4.46hours on-demand video
  • 4 downloadable Pdf Workbooks
  • Unlimited time access (During Membership)
  • Access on mobile and Desktop
  • Certificate of Completion