DFIR Training
  • Home
  • Tools
  • Practice
  • Resources
  • Artifacts
  • Members
  • Contact
  • Login
  • Forgot Password
  • Home
  • Tools
  • Practice
  • Resources
  • Artifacts
  • Members
  • Contact
  • Login
  • Forgot Password

Logo-Atola
Logo-CyberTriage
Logo-CyberTriage
Logo-Belkasoft
Logo-DFIR Training

Partners & Sponsors

Logo-Forensic Notes
Logo-Magnet
Logo-Basis
Logo-Basis
Logo-Atola
Logo-Belkasoft
Logo-

Latest listings

Ain’t That a Kik in the Head: Kik Messenger iOS Analysis
Investigating Ransomware: Call for Presentations
Cyber Responder Con
Data Triage Computers & Smartphones
How to Validate Your Forensic Tools
Information Exposed Whitepaper
Mobile First Responder eBook
Computer Forensic Examiner Quick Reference Guide 2.3
ertified Advanced Windows Forensic Examiner (CAWFE)
DFIR Tools are evil, but only if you are using the wrong tool.
Wireless Networks and OSINT
Using Breach Data in OSINT Investigations
Username Searching
Tool: Spiderfoot
Tool: Sherlock
Tool: Holehe
Tool: DNSRecon
Tool: CyberChef
Using Commandline OSINT Tools Introduction
Telegram Analysis
Creating an OSINT Investigation Platform
OSINT Documentation with Obsidian
Using OSINT in Threat Assessment and Critical Incident Management
Creating a Digital Forensic Capability
Board Level Repair for the Digital Forensic Examiner

Resources Menu

  • Associations DirectoryOrganizations & Meetups
  • BooksPublications
  • Business DirectoryServices & Products
  • CertificationsCertifications and Providers
  • Cheats & InfographicsCheatsheets & visuals
  • Educational DirectoryColleges & Universities
  • NetworkingSocial networks and blogs
  • ResearchWhite papers & Tests
  • Search Term ListsDownloadable keyword lists
  • Templates & GuidesPolices, guides, templates
© 2022 DFIR Training
Logo-Atola
Logo-CyberTriage
Logo-CyberTriage
Logo-Belkasoft
Logo-DFIR Training
Twitter Facebook YouTube LinkedIn Instagram Reddit