BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!
Course Overview
This course provides a comprehensive introduction to digital forensics, teaching students how to investigate computer crimes, recognize a hacker’s activity, and uncover digital evidence across a variety of systems. Through lectures, demonstrations, and hands-on exercises, participants will learn how to collect, preserve, and analyze evidence from Windows, Linux, and Macintosh systems, as well as mobile devices and network environments. Students will explore techniques for recovering hidden or deleted data, examining email and web activity, and analyzing network traffic to track intrusions. Practical exercises include reconstructing web browsing histories, examining suspicious email attachments, investigating real-world exploits, and performing memory and mobile forensics. The course also covers forensic methods, lab practices, incident response, and emerging trends in the field, equipping learners with the skills to conduct thorough investigations and support ongoing security efforts. At the completion of this course, participants will be able to:
- Explain the fundamentals of digital forensics and computer crime.
- Apply proper methods for collecting, seizing, and protecting digital evidence.
- Recover deleted or hidden data from Windows, Linux, and Macintosh systems.
- Investigate emails, web activity, and network traffic to identify suspicious behavior.
- Perform mobile device and memory forensics.
- Conduct incident and intrusion response investigations.
- Analyze real-world attacks and reconstruct digital evidence for reporting.
- Understand current trends and best practices in the field of digital forensics.
There are no specific prerequisites for this course. However, it is highly recommended that you have either the CompTIA® Network+ or Security+ Certification before enrolling in this course.
Schedule
Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.
![[image]](https://phoenixts.com/wp-content/themes/phoenixts-com/assets/images/temp/image-9@2x.jpg) 
    Not seeing a good fit?
Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.
Learn more about custom training
[/expandable_content]
BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!
Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org
![[GSA LOGO]](https://phoenixts.com/wp-content/themes/phoenixts-com/assets/images/gsa-logo-black.png)