TRAINING COURSES

HOME   /   TRAINING   /   DIGITAL FORENSICS & INCIDENT RESPONSE

Digital Forensics & Incident Response

Digital Forensics and Incident Response (DFIR) is a comprehensive course designed to arm participants with the knowledge and skills needed to identify, investigate, and respond to cyber incidents. Through a combination of lectures, hands-on labs, and real-world case studies, participants will gain a deep understanding of the tools, techniques, and best practices used in the field of DFIR. The course will cover a wide range of topics, including:

  • The incident response process and incident handling best practices. Identification of common attack vectors and malware
  • Digital forensics techniques for data collection and analysis Network forensics and analysis
  • Memory forensics and analysis Windows and Linux forensics

Participants will also have the opportunity to work on a variety of practical exercises and case studies, giving them the chance to apply their knowledge to real-world scenarios. Upon completion of the course, attendees will be well-prepared to take on roles in incident response, digital forensics, and other cybersecurity-related positions. The course has been designed for professionals with a basic understanding of networking and operating systems, but no prior experience in DFIR is required.

Learning Objectives

Students will understand:

  • Essential knowledge and key concepts behind DFIR
  • Tools agnostic understanding of digital forensics artifacts
  • Hands-on experience with free/open-source forensics tools
  • Ability to perform digital forensics independently

Prerequisites

TBD

Requirements

Students will need:

  • Laptop with Linux/Windows x64latest version of Virtualbox/ VMware installedKali linux VM, Flare VM (windows)
A digital forensics toolkit for law enforcement, enhancing capabilities to investigate cybercrimes
  • TARGET AUDIENCE
  • Security Professionals
  • IT Professionals
  • Cybercrime Investigators
  • Network Administrators
  • Digital Forensics Examiners Penetration Testers
  • Security Analysts
  • Incident Responders
  • Standard Rate

Why choose the Center for Cyber Security Training

Interactive, classroom-based learning

Subject matter experts

Trusted by US government agencies

peter-van
Peter Van Eeckhoutte

Peter Van Eeckhoutte is the founder of Corelan Team and the author of the well-known tutorials on Win32 Exploit Development Training. The team gathers a group of IT Security enthusiasts and researchers from around the world, who all share common interests : doing research, gather & share knowledge, and perform responsible/coordination disclosure. Above all, the team is well known for their ethics and their dedication to helping other people in the community. Together with the team, he has developed and published numerous tools that will assist pentesters and exploit developers, and published whitepapers/video’s on a wide range of IT Security related topics (pentesting tools, (malware) reverse engineering, etc).

You can find some of the tools on the Corelan github page.

Peter has been an active member of the IT Security community since 2000 and has been working on exploit development since 2006. He presented at various international security conferences (Athcon, Hack In Paris, DerbyCon, ISSA Belgium) and taught various Win32 Exploit Development courses at numerous places around the globe. He trained security enthusiasts & professionals from private companies, government agencies and military organizations.

Classes are limited. Get registered!

One of the most gruelling yet beneficial training courses that I have ever attended in my entire ofsec career! This course is definitely a good start for those who really want to get well acquainted with the basics of exploit development. On top of that, Peter is such an amazing instructor in terms of delivering his content and sharing with us some tips and tricks when facing problems during the lab exercises. Highly recommend.

Hamzah, Singapore

Want more information?

Download the Reverse Engineering course outline now.

Upcoming Training Sessions

March 10-13, 2025 (In-person, Columbia, MD) August 25-28, 2025 (In-person, Columbia, MD)

Classes are limited.

Enroll Now.

Related Courses

Our classroom delivers the most in-demand content from the highest profile subject matter experts. Intense and interactive, our courses prepare students with actionable insight and proven strategies.

Malware reverse engineering, layered obfuscation and complex algorithms. obfuscate. illustration. Riversong. Illustration

Reverse Engineering Basics for Malware & Program Analysis

Start your reverse engineering journey with this beginner-friendly course that builds a strong foundation for advanced topics like malware analysis, vulnerability research, and program analysis. You'll learn everything from processors and assembly languages to memory layout, compilers, and core programming concepts.

windows-malware

Windows Malware Techniques (WINMAL)

Explore cutting-edge user-mode malware techniques on Windows—perfect for red teamers, malware analysts, and defenders looking to understand, analyze, and detect malicious behavior using Windows APIs and system internals.

Looking for a course that's not here? We'd love to hear your suggestions!

Are you fully prepared to deal with today's increasing cyber security risks? We can help you get the training you need.

TRAINING INQUIRY

*We respect your privacy