Annual Training Pass
Elevate your digital investigation capabilities with Belkasoft's comprehensive on-demand training bundle. This annual pass gives you access to 8 specialized courses covering essential forensic disciplines across multiple platforms.

A free 30-day trial license for Belkasoft X provided
Training materials included
Practical tasks
Certificates of completion and achievement
1
month
Course completion typically takes 1 month, with 1 year of access.
8
courses
This bundle includes eight courses
Courses in bundle
This bundle includes 8 courses
For €2999* instead of €7992*
Windows Forensics with Belkasoft
+8 Hours
8 Sections
€999*
Incident investigations with Belkasoft
+4 Hours
5 Sections
€999*
Maximizing DFIR Results with YARA, Sigma, and Belkasoft X
+8 Hours
5 Sections
€999*
iOS Forensics with Belkasoft
+6 Hours
6 Sections
€999*
Android Forensics Training
+6 Hours
6 Sections
€999*
SQLite Forensics with Belkasoft
+8 Hours
7 Sections
€999*
Remote Acquisition with Belkasoft
+4 Hours
5 Sections
€999*
Corporate Investigations with Belkasoft
Hours
Sections
€999*
What you will learn
This course is tailored for digital forensics investigators who work with Windows computers. It provides an opportunity to enhance your knowledge and gain practical experience in identifying and analyzing Windows artifacts.
Topics covered
- How to review common Windows file systems, and which file system features might be useful in a DFIR investigation
- How to examine Windows applications, such as chats, browsers, and mail clients
- How to inspect media files and documents, and utilize media-specific analysis options, such as text recognition and keyframe extraction
- How to identify and analyze forensically important Windows system files, such as registry files, event logs, and LNK files
- How to get more evidence from a Windows data source by using carving, embedded data analysis, and other advanced forensic techniques
This course is designed for experienced DFIR professionals seeking to enhance their knowledge and gain practical experience in utilizing Belkasoft products to solve incident investigations in the Windows environment.
Topics covered
- How to hunt for initial infection vector with Belkasoft and what tricks are usually used by hackers to penetrate company's infrastructure
- How to uncover cyber threat actors' persistence mechanisms
- How to track potentially malicious files with evidence of execution
- How to use filtering, timeline and other techniques in order to narrow your search and conduct a successful incident investigation with Belkasoft X
This course is designed for cybersecurity specialists with prior experience in DFIR who wish to enhance their incident response capabilities by incorporating YARA and Sigma rules into their existing stack.
Topics covered
- What important information can be obtained from system event logs, LNK files, and other system files
- What Sigma and YARA rules are and how they can assist in your investigation
- How to interpret, construct, and tune Sigma rules
- How to read and write YARA rules and improve their efficiency
- How to use wildcards and regular expressions in rule creation
- How to apply Sigma and YARA rules in Belkasoft X
This course is tailored for digital forensics investigators who frequently encounter iOS devices in their work.
Topics covered
- How to use basic and advanced methods of iOS acquisition, such as checkm8-based and agent-based acquisition
- How to acquire iOS data from the cloud
- How to analyze iOS apps, including encrypted ones
- Which iOS system files may be of interest for a DFIR investigation and how to analyze them
- [LE only] How to use Belkasoft X Brute-Force tool to unlock certain models of iPhone and iPad devices
This course is designed to provide a comprehensive understanding of Android forensics, covering the latest techniques and tools used in the field. Participants will learn how to extract, analyze, and interpret data from Android devices, including app data, call logs, messages, and more. The course will also cover best practices for evidence handling and reporting.
Topics covered
- How to use basic and advanced methods of Android acquisition, such as ADB-based and APK downgrade acquisition
- What chipset-specific acquisition methods can be used
- How to analyze Android apps, and what information can be extracted from them
- Which Android system files may be of interest for a DFIR investigation and how to analyze them
This course is designed for digital forensics investigators and cyber incident responders who wish to gain a deeper understanding of SQLite.
Topics covered
- Why the SQLite format is so widespread, and how WhatsApp, Viber, and other popular apps store their data
- Important SQLite database features and settings
- The consequences of using an inappropriate tool for the analysis of SQLite-based applications
- How to locate deleted data inside an SQLite database
- How to use Belkasoft’s top-notch SQLite Viewer to find important information and create a report
This course is designed for individuals seeking to learn the latest techniques and best practices for effectively acquiring critical data from remote endpoints. It covers the preparation steps, including configuring a server and deploying an agent to an endpoint, and offers practical insights into data acquisition methods.
Topics covered
- How to configure a Belkasoft R server and what additional system tools might be useful
- How to deploy an agent on an endpoint machine, depending on the network configuration
- How to acquire data from endpoints
- What acquisition types are available and most effective
- How to analyze remotely acquired data with Belkasoft X
This course is tailored for cybersecurity experts, such as incident response team members (CIRT), corporate eDiscovery professionals, and cyber compliance specialists. Their primary objective is to enhance the security of their business networks and acquire the knowledge necessary to swiftly respond to various data breaches.
Topics covered
- How to analyze internet artifacts, such as emails and web browsing history
- How to use the built-in Connection Graph viewer to visualize connections between people and their communications
- How to analyze system artifacts, such as the Windows registry, Windows 10 Timeline, and others
- How to detect and counter various anti-forensics techniques
- How to use carving techniques to recover deleted data from a hard drive and perform memory forensics
- How to narrow your search using the Timeline view and Hashset analysis
Annual Training Pass
Elevate your digital investigation capabilities with Belkasoft's comprehensive on-demand training bundle. This annual pass gives you access to 8 specialized courses covering essential forensic disciplines across multiple platforms.
Important Notice
All courses are in English