Cyber5W ⠀

Digital Forensics Training & Consulting

We are a team of digital forensics specialists dedicated to helping businesses, law enforcement, and individuals understand and investigate cybercrime. Led by Professor Ali Hady , Ph.D., who has consulted with and delivered training to law enforcement, banks, and businesses.

He is a published author, researcher, and professor teaching Computer & Digital Forensics and Computer Networking & Cyber Security at Champlain College in Burlington, VT, USA.

Course curriculum

  • 1


    • Why evidence acquisition is important

    • Must-Know First Response actions

    • Have a question?!

  • 2

    Sanitization of the Target Media

    • Required Files

    • Sanitization

    • Hardwipe Tool

    • Cygwin tools (dd command in Windows)

    • Exercise #1

    • Exercise #1 Solution

  • 3

    Acquisition Tools

    • Required Files

    • Evidence Data Acquisition

    • Memory Dump

    • Tools for Memory Dump

    • Disk Drive Imaging

    • Other Forensic Tools

    • Exercise#2

    • Solution_Exercise#2

  • 4

    Hardware Acquisition Tools

    • Examples of Hardware Acquisition Tools

    • Using UltraDock Write-Blocker

  • 5

    Mounting a Forensic Image

    • Required Files

    • Introduction to Image Mounting

    • Arsenal Image Mounter

    • OSFMount

    • Other Forensic Image Mounting Tools

    • Exercise#3

    • Solution_Exercise#3

  • 6


    • Chapter Summary

Learning Outcomes

  • Learn how to wipe a disk and use the tools Hardwipe and dd (on Windows) for disk wiping.

  • Practice RAM data capturing using Belkasoft, Magnet RAM capture, and Dumpit

  • Practice disk data acquisition using the tools Belkasoft, FEX Imager, and dd command