Please explore our course catalog. We can deliver any of these courses
at your own site, at your own pace,
and customized to meet your own needs.
Alternatively, many of these courses are also
offered for public registrations
at our own training facilities. The choice is yours!
FTK Imager 100 is a one-day course that will introduce the student to AccessData’s free powerful imaging solution, FTK Imager. This course will not only cover the features and process for using Imager, but will also explain the technology and concepts behind the process. FTK Imager 100 covers how to create a forensic image using various types of image formats, view evidence from various sources, creating custom content images, and using the triage features found in FTK Imager.
Registry Viewer 100 is a one-day course that will introduce the student to AccessData’s Registry Viewer. With Registry Viewer an investigator can quickly and effectively view Windows Registry hive files, and the keys and information stored within them. This course will also cover the basics of how the Windows Registry functions, and students will learn how to search for relevant information, save frequent locations of evidence for later cases, and create reports using Registry Viewer.
Password Recovery Toolkit 100 is a two-day course that will introduce the student to AccessData’s Password Recovery Toolkit (PRTK). This course will cover the concepts of encryption and decryption methods needed to break into some of the world’s common encryption solutions. This course covers all the features and processes needed to get the most out of PRTK, including the integration with AccessData’s FTK and FTK Enterprise solutions.
Forensic Toolkit 101 is a five-day course that will introduce the student to AccessData’s Forensic Toolkit (FTK) and the many features that aid the investigator in solving a wide variety of cases effectively. Over the five-day course students will get hands on time with each of the features within FTK. This course is designed for both new users to forensics, or those with years of forensic experience. While this course will use forensic artifacts to demonstrate the features, the focus of FTK 101 is to really teach the features and processes available to the investigator. This course serves as a foundation for the courses FTK Enterprise 105, FTK 201, and FTK 301.
FTK Enterprise 105 is a three-day course that gives corporate professionals an in-depth hands-on training in the features and processes for using FTK Enterprise. This course will cover role assignment, permissions management, remote acquisition using FTK’s agent deployment, memory analysis, and more. Enterprise 105 is primarily tool-based training teaching the features and functions of the tool. This course is designed for students that have taken FTK 101 or are experienced users of FTK or FTK Enterprise.
Forensic Toolkit 201 is a five-day course that builds on the skills and concepts learned in Forensic Toolkit 101. FTK 201 is a forensic artifact-based course, and takes a deeper dive into artifact analysis using the FTK tools. This course will guide students through various Windows operating system artifacts, documents, media files investigations and more. This course also includes training in AccessData’s new forensic review tool, QView. This course assumes that the student has taken the preceding courses or has experience using the FTK tools.
Forensic Toolkit 301 is a five-day course covering advanced features and techniques for using AccessData’s Forensic Toolkit. This course covers features like the Python Scripter, Facial Recognition, regular expression and TR1 searching, advanced filesystem artifacts, and more. This course will take deeper dives into various artifacts across multiple operating systems involved in many different types of investigations. This course is designed for a student that has taken the preceding courses or has experience using FTK tools.
Tool Compliance Testing is a one-day course providing students with the information and concepts necessary for creating testing and verification methodology for forensic tools and labs. Using AccessData’s Forensic Toolkit, students will follow the process of tool testing including; planning, risk assessment, building and validation of testing images, and reporting.
This course provides students with the knowledge and skills necessary to install, configure, and effectively use the combined abilities of AccessData's Forensic Toolkit (FTK), FTK Imager, Registry Viewer, and Password Recovery Toolkit® (PRTK®) to locate and examine email messages, deleted files, free space and file slack. Additionally, students will learn how to search for and export graphic files, export and gain access to encrypted files from multiple industry-standard applications, document digital media information, work with multiple forensic image formats and much more.
FTK Intermediate builds on the concepts and skills learned in the FTK Bootcamp course. This course takes a deeper dive in AccessData’s Forensic Toolkit, FTK Imager, and Registry viewer. Participants will learn advanced searching, filtering, timelining, and much more in FTK Intermediate. Advanced features such as Optical Character Recognition, Explicit Image Detection, and Regular Expression searching are covered in depth in this course, giving examiners the skills they need to find the information needed to complete a case.
Learn to analyze artifacts found on Windows-based systems where an intrusion has been detected using AccessData Enterprise. Students will learn how to utilize AD Enterprise to detect, indentify and investigate security breaches and other incidents. In addition, students will learn how to leverage AD Enterprise in identifying and remediating all affected nodes across the enterprise. Discussion will focus on remote data collection, analysis of file data, Windows processes and DLLs, registry data, network artifacts and rootkit detection. Students will reinforce lessons learned with practical exercises throughout the course.
In the continually evolving Windows Forensics series, the Windows registry continues to be a major source of Windows-related artifact and information storage. Having the proper knowledge of registry-based artifacts can make or break an investigation. In this advanced course, attendees will utilize AD technology while being exposed to: Registry hive, cell and "hbin" block construction; live registry file capture from a Windows environment; carving registry key information from dumped memory files; as well as registry testing, analysis and reporting technology.
This advanced three day course provides the knowledge and skills necessary to analyze the New Microsoft® Windows 10® operating system artifacts, user data and file system mechanics. During this three-day course, participants will review Windows 10 features, learn of artifact locations for Microsoft Edge Browser, Cortana, OneDrive and get an overview of core registry files and new values of forensic interest pertaining to user activity on a Windows 10 system.
Advanced SQLite and Database Analysis takes a deep dive into SQLite databases. This course covers the file structure of a SQLite database from the Hex level to the natural view structure. Learn how SQLite databases work, and how to recover deleted entries from the database. Attendees will spend three days learning to write SQLiite queries which allow the examiner to retrieve the information they need, in the format they need. Attendees should be familiar with the basic operation of computers, and have some prior experience with hexadecimal and hex viewers.
This advanced course provides the knowledge and skills necessary to use the Unicode compliant PRTK and DNA® tools, as well as TACC and PORT® devices to recover passwords from industry-standard applications and systems. FTK 2 and Registry Viewer will also be utilized. While learning how to create effective attack profiles that include biographical profile dictionaries, user-defined dictionaries and Unicode-compliant character searches, students will determine how several commonly applied encryption schemes work.
The AccessData FTK Investigations class, built specifically for the Techno Conference in
Myrtle Beach, South Carolina. This course will provide the necessary skills and information necessary to conduct various types of investigations using AccessData’s Forensic Toolkit
The AccessData Certified Examiner (ACE) Preparation course covers the information needed to use AccessData's Forensic Toolkit, FTK Imager, Registry Viewer and the Password Recovery Toolkit (PRTK) to pass the ACE certification. On the last day of the course participants will have the opportunity to take the ACE certification test at no additional cost.
The FTK Mobile course covers the features of AccessData's Forensic Toolkit that apply to mobile device data. The course takes an in depth look at filtering, column creation, and searching to retrieve, format, and report mobile device data in a format that best suits the investigation. Learn about the new mobile data expansion options such as Android Parsers, Cellebrite UFED Report parsing, and Belkasoft parsing integration.
The AccessData Summation Bootcamp is a customizable training course that covers the fundamentals of AD Summation—administration, case management, and review. The topics and the order in which they are covered will be determined during a consultation with AccessData Training prior to the course. Upon completion of the course, a course certificate of completion will be provided.
The AccessData Summation Administration course provides the knowledge and skills to administer AD Summation efficiently and effectively. The tools discussed are geared toward the Summation Administrator, the member of the Summation team responsible for setting up and maintaining AD Summation at a global level. Upon completion of the course, a course certificate of completion will be provided.
The Summation Administration course is the framework for candidates working toward the Summation Certified Administrator (SCA) credential.
The AccessData Summation Case Management course provides the user with an understanding of the workflows related to case management practices—basic navigation, user and custodian management, permissions management, loading data, early case assessment tools, and configuring review tools. The tools featured are key to how the legal team reviews, analyzes and manages discovery over the life of a case. Upon completion of the course, a course certificate of completion will be provided.
The AD Summation Case Management course is the framework for candidates working toward the Summation Certified Case Manager (SCCM) credential.
The AccessData Summation Reviewer course is designed for all members of the litigation team and provides the essential tools needed to perform basic tasks associated with a review—understanding workflows, navigating the interface, searching techniques, coding and annotating documents, and case planning. Upon completion of the course, a course certificate of completion will be provided.
The AD Summation Reviewer course is the framework for candidates working toward the Summation Certified End-user
The AccessData Summation Rapid Review course is designed specifically for the reviewer that needs to jump into a matter and review records and relies on their staff for case creation, loading data, case configuration, complex searches, etc. This course provides the essential tools needed to perform a basic document review—case navigation, searching, coding/tagging, and redacting/highlighting. Upon completion of the course, a course certificate of completion will be provided.
The AccessData eDiscovery Fundamentals course provides an in depth look at how the AccessData eDiscovery product can be used by organizations throughout the litigation life cycle. The AD eDiscovery Fundamentals Full course is geared toward the entire team responsible for a litigation matter: the administrators and IT staff who manage the tool and handle collections, and the legal team (attorneys, litigation support staff, paralegals) responsible for managing litigation holds and executing case review. Upon completion of the course, a course certificate of completion will be provided.
The AccessData eDiscovery Fundamentals course provides an in depth look at how the AccessData eDiscovery product
can be used by organizations throughout the litigation life cycle. The AD eDiscovery Fundamentals Part 1 course is
geared toward the administrators and IT staff responsible for the management, administration, and collections
throughout the life of a litigation matter. Upon completion of the course, a course certificate of completion will be
The AccessData eDiscovery Fundamentals course provides an in depth look at how the AD eDiscovery product can be
used by organizations throughout the litigation life cycle. The AD eDiscovery Fundamentals Part 2 course is geared
toward the legal team—attorneys, litigation support, paralegal staff—responsible for the document review process, as
well as those responsible for managing litigation holds. Upon completion of the course, a course certificate of
completion will be provided.