Computer Forensic Techniques and Tools

Course Overview

• Understand the fundamentals of computer forensics and its role in investigating cybercrimes
• Learn various techniques and tools used in collecting, analyzing, and preserving digital evidence
• Gain practical experience in applying computer forensic methodologies to real-world scenarios

Training Format:In-class, Virtual, In-house

Location:Lagos, Accra, Nairobi, Kigali

Language:English, French

Nigeria Price:
₦350000

Int'l., (Nigeria) Price:
$1000

Ghana Price:
$4000

Kenya Price:
$5500

Rwanda Price:
$6000

Nigeria Price:₦350000

Int'l., (Nigeria) Price:
$1000

Ghana Price:
$4000

Kenya Price:
$4000

Rwanda Price:
$4000

Nigeria Price: ₦350000

Int'l., (Nigeria) Price:
$1000

Ghana Price: $4000

Kenya Price: $4000

Rwanda Price: $4000

Introduction to Computer Forensics
• Fundamentals of computer forensics
• Types of cybercrimes and investigation procedures
• Regulations and standards influencing computer forensics investigations

Digital Evidence Collection and Acquisition
• Data acquisition methodologies
• Imaging and hashing techniques
• Handling and preserving digital evidence

File System Analysis
• Understanding file systems in Windows, Linux, and Mac operating systems
• File system examination tools
• Data recovery techniques

Disk Forensics
• Characteristics of different disk drives
• RAID and NAS/SAN storage systems
• Encoding standards and file format analysis

Anti-Forensics and Countermeasures
• Common anti-forensics techniques used by attackers
• Methods to detect and mitigate anti-forensics
• Related tools and countermeasures

Operating System Forensics
• Volatile and non-volatile data acquisition in Windows
• Windows memory and registry analysis
• Windows file system forensics (ShellBags, LNK files, Jump Lists, event logs)
• Volatile and non-volatile data acquisition in Linux and Mac
• Memory forensics in Linux and Mac

Network Forensics
• Network forensics fundamentals
• Event correlation and Indicators of Compromise (IOCs)
• Network traffic investigation techniques and tools
• Wireless attack detection and investigation

Malware Forensics
• Static and dynamic malware analysis
• System and network behavior analysis
• Ransomware analysis

Web Application Forensics
• Web application threats and attacks
• Web application log analysis (IIS, Apache)
• Investigation of web application attacks

Specialized Forensics
• Tor browser forensics
• Cloud forensics (AWS, Microsoft Azure, Google Cloud)
• Email and social media forensics
• Mobile forensics (Android and iOS)
• IoT forensics

Whom can attend:
• Law enforcement personnel
• Cybersecurity professionals
• IT security analysts
• Digital forensics investigators
• Incident response team members

1ST BATCH: Tuesday, January 13, 2026 — Friday, January 16, 2026.

2ND BATCH: Tuesday, May 5, 2026 — Friday, May 8, 2026.

3RD BATCH: Tuesday, September 1, 2026 — Friday, September 4, 2026.

The training methodology integrates lectures, interactive discussions, collaborative group exercises, and
illustrative examples. Participants will acquire a blend of theoretical insights and hands-on practical
experience, emphasizing the application of learned techniques. This approach ensures that attendees return
to their professional environments equipped with both the competence and self-assurance to effectively
implement the acquired skills in their responsibilities.

Facebook
WhatsApp
X
Threads
Telegram
Print