Top Cyber Warriors
share their knowledge

Master key skills in digital forensics and information security with our online courses created by experienced Cyber Warriors from Blue Team and DFIR, who have helped strengthen the cybersecurity of leading companies.

Start 3-day trial for $1

Doug Carner,PRESIDENT OF FORENSIC PROTECTION
Read More
"I completed this course today and am truly impressed. This course is detailed, well structured, and comprehensive in scope. If you are serious about a career as an Image-Video Forensic Analyst, then this is the course for you. If you are a beginner in this field then be prepared to be immersed in knowledge, science, and practical lessons at your own pace schedule."
Doug Carner,
Doug Carner,PRESIDENT OF FORENSIC PROTECTION
Read More
"I completed this course today and am truly impressed. This course is detailed, well structured, and comprehensive in scope. If you are serious about a career as an Image-Video Forensic Analyst, then this is the course for you. If you are a beginner in this field then be prepared to be immersed in knowledge, science, and practical lessons at your own pace schedule."

Latest Products

Israel Torres OfficialNew

VirusTotal’s Code Insight Versus ChatGPT Analysis

In the meanwhile, not too long ago, VirusTotal announced their Generative AI threat analysis feature named Code Insight. With a great-looking future ahead, it starts with humble beginnings. As a matter of fact, such a pivot has occurred with the announcement of ChatGPT that no one is talking about NFT and/or crypto anymore, everything is now AI-centric (again, for now). So this article goes well in hand with my VirusTotal Enterprise Series 12, available at eForensics's site.

Jun 06,2023

21 min read

justkate OfficialNew

Artificial Intelligence in Digital Forensics

This article explores how AI and AI powered tools and techniques are transforming digital forensics, enhancing its effectiveness, and enabling investigators to navigate the ever-evolving landscape of cybercrime.

Jun 01,2023

11 min read

Wilson Mendes OfficialNew

Steganography – A Hidden Reality Far Beyond What The Eyes Can See

Steganography is an ancient secret communication technique that consists of hiding messages within other means of communication, such as images, texts, or physical objects. The term "steganography" derives from the Greek words "steganos" (hidden or covered) and "graphein" (to write), reflecting its nature.

Jun 01,2023

22 min read

Dauda Sule Course

eForensics Course for eWarfare: Investigations, Threat Detection and Reconnaissance in the Electromagnetic Spectrum (W59)

eForensics for eWarfare: Investigations, Threat Detection, and Reconnaissance in the Electromagnetic Spectrum" is an innovative course designed to introduce learners to the application of digital forensics tools and techniques in electronic warfare. It aims to deepen participants' understanding of electronic warfare, its history, military applications, and how digital forensics is applied in warfare and intelligence. The course also focuses on the significance of electronic warfare in today's world, discussing potential threats and how to mitigate them. COURSE STRUCTURE: This course is structured into several key modules, each focusing on a specific aspect of electronic warfare. The modules are: Introduction to Electronic Warfare Notable Milestones in the Development of Electronic Warfare A Look at Air Force Radar Systems Military Application of Digital Forensics Investigating Incidents on Critical Infrastructure: Industrial Control Systems (ICS) Each module ends with a multiple-choice quiz to ensure understanding, with a pass mark of 75%. EQUIPMENT & PREREQUISITES: To participate, students will need a PC, tablet, or smartphone with an internet connection. Basic knowledge of information systems, cybersecurity, and digital forensics is recommended. ABOUT THE LECTURER: This course is led by an experienced lecturer from the Cyber Security Department of the Air Force Institute of Technology (AFIT), Kaduna. With a background in both training and consulting, the lecturer has considerable expertise in a range of relevant areas, including information and physical management, security, assurance, and control. Furthermore, he has authored numerous articles in well-established journals, including eForensics Magazine and the ISACA Journal, and has led training workshops on digital forensics and eDiscovery.

May 26,2023

13 min read

Paulo Pereira OfficialNew

Reflections on Artificial Intelligence and Digital Forensics

An Artificial Intelligence is, basically, the association between an algorithm (or algorithms) and a set of data prepared for decision making. The algorithm is trained on this database and learns from that data. There are a variety of AIs applied from pattern recognition to the creation of images from certain guidelines passed to an algorithm by the end user.

May 31,2023

13 min read

Israel Torres OfficialNew

VirusTotal’s Code Insight Versus ChatGPT Analysis

In the meanwhile, not too long ago, VirusTotal announced their Generative AI threat analysis feature named Code Insight. With a great-looking future ahead, it starts with humble beginnings. As a matter of fact, such a pivot has occurred with the announcement of ChatGPT that no one is talking about NFT and/or crypto anymore, everything is now AI-centric (again, for now). So this article goes well in hand with my VirusTotal Enterprise Series 12, available at eForensics's site.

Jun 06,2023

21 min read

justkate OfficialNew

Artificial Intelligence in Digital Forensics

This article explores how AI and AI powered tools and techniques are transforming digital forensics, enhancing its effectiveness, and enabling investigators to navigate the ever-evolving landscape of cybercrime.

Jun 01,2023

11 min read

Wilson Mendes OfficialNew

Steganography – A Hidden Reality Far Beyond What The Eyes Can See

Steganography is an ancient secret communication technique that consists of hiding messages within other means of communication, such as images, texts, or physical objects. The term "steganography" derives from the Greek words "steganos" (hidden or covered) and "graphein" (to write), reflecting its nature.

Jun 01,2023

22 min read

Paulo Pereira OfficialNew

Reflections on Artificial Intelligence and Digital Forensics

An Artificial Intelligence is, basically, the association between an algorithm (or algorithms) and a set of data prepared for decision making. The algorithm is trained on this database and learns from that data. There are a variety of AIs applied from pattern recognition to the creation of images from certain guidelines passed to an algorithm by the end user.

May 31,2023

13 min read

Dauda Sule Course

eForensics Course for eWarfare: Investigations, Threat Detection and Reconnaissance in the Electromagnetic Spectrum (W59)

eForensics for eWarfare: Investigations, Threat Detection, and Reconnaissance in the Electromagnetic Spectrum" is an innovative course designed to introduce learners to the application of digital forensics tools and techniques in electronic warfare. It aims to deepen participants' understanding of electronic warfare, its history, military applications, and how digital forensics is applied in warfare and intelligence. The course also focuses on the significance of electronic warfare in today's world, discussing potential threats and how to mitigate them. COURSE STRUCTURE: This course is structured into several key modules, each focusing on a specific aspect of electronic warfare. The modules are: Introduction to Electronic Warfare Notable Milestones in the Development of Electronic Warfare A Look at Air Force Radar Systems Military Application of Digital Forensics Investigating Incidents on Critical Infrastructure: Industrial Control Systems (ICS) Each module ends with a multiple-choice quiz to ensure understanding, with a pass mark of 75%. EQUIPMENT & PREREQUISITES: To participate, students will need a PC, tablet, or smartphone with an internet connection. Basic knowledge of information systems, cybersecurity, and digital forensics is recommended. ABOUT THE LECTURER: This course is led by an experienced lecturer from the Cyber Security Department of the Air Force Institute of Technology (AFIT), Kaduna. With a background in both training and consulting, the lecturer has considerable expertise in a range of relevant areas, including information and physical management, security, assurance, and control. Furthermore, he has authored numerous articles in well-established journals, including eForensics Magazine and the ISACA Journal, and has led training workshops on digital forensics and eDiscovery.

May 26,2023

9 min read

The Complete Path to Passing the CHFI Certification Exam - Digital Forensics Mastery Program (W58)

We are proud to offer our comprehensive 15-module course, "Become a Certified Computer Forensics Investigator: The Complete Path to Success in Passing the CHFI Certification Exam." This course is designed to provide you with a deep understanding of the computer investigation process and prepare you to become a certified computer forensics investigator. Our course covers a wide range of topics including data acquisition, network forensics, database forensics, cloud forensics, mobile device forensics, and more. Each module is designed to give you hands-on experience with the tools and techniques used in digital forensics investigations. You will also learn how to identify and counteract anti-forensics techniques and recognize potential cyber threats. Our experienced instructors will guide you through the course material and help you prepare for the CHFI certification exam. Additionally, you will have access to our exclusive community on Discord, where you can share insights and experiences with fellow students, ask questions of our instructors, and network with other professionals in the field. After completing the course, you will have the knowledge and skills needed to succeed as a computer forensics investigator and earn the CHFI certification. Enrol today and start your journey to becoming a certified computer forensics investigator!

May 08,2023

22 min read

Browser Forensics (W57)

The course is aimed at allowing investigators to know the inner workings of the most used and well-known browsers from a digital forensics perspective. Nowadays, everything is done using the web. Most applications are web-based, which led to the importance of browser forensics for any digital forensic case. The interesting thing about browser forensics is the amount of information that you can extract and draw for a case.

Oct 03,2022

10 min read

Cloud Forensics (W56)

Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. Large clouds often have functions distributed over multiple locations, each location being a data center. The nature of cloud computing – particularly cloud service provider management and distribution over multiple locations – makes forensic investigations difficult and seemingly impossible. Data centers alone can be a separate forensic discipline. This course merges cloud technology with sound forensic processes and principles to effectively conduct cloud forensic investigations using Amazon Web Services as a case study example.

Aug 26,2022

19 min read

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023