Requested resource is not accessible

Course archive

The courses below were all published in 2015 or earlier. While we stand by pubishing them then, we've grown so much since. We recognize that these workshops don't exactly meet our standards, as we understand them today. 

All classes are available within our premium membership, and have adjusted CPE awards to reflect their respective contents. If you join, please keep in mind that some of the information inside might be outdated or not relevant. We'll be adding notes at the beginning of each course to let you know what's worth checking out in each! 

The access to this course is restricted to eForensics Premium or IT Pack Premium Subscription

18 CPE credits


Course format

  • The course is self-paced – you can visit the training whenever you want and your content will be there.
  • Once you’re in, you keep access forever, even when you finish the course.
  • There are no deadlines, except for the ones you set for yourself.


Module 1

Introduction to Computer Forensics 

Module 2

Live System Forensics
RAM Analysis
Registry Analysis
Live System Analysis

Module 3

Data Acquisition
FTK Imager
Linux dd

Module 4

System Analysis
Browser Forensics
Password Cracking
Metadata Analysis
Email Investigation

 Module 5

Case Scenarios

Course Reviews


2 ratings
  • 5 stars1
  • 4 stars1
  • 3 stars0
  • 2 stars0
  • 1 stars0
  1. good one


    videos can produce more better effects

  2. Computer Forensics In Practice


    Really enjoyed this course. It was extremely informative and I enjoyed it immensely.

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023