About AccessData    |     Support    |     Follow Us on Facebook     |     Follow Us on Twitter


AccessData is proud to offer a series of exciting live training webinars based on some of our most popular hits of the recent past. Our rock-star trainers have 30 years of experience backing them up to deliver superior training and certifications in digital forensics and legal e-discovery. We're comping your tickets, so hurry up and reserve your seat—they won't last long! 

View these webinar on demand on our YouTube Channel.


Cerberus & Malware Analysis
An important aspect of computer forensics is the need to identify any possible malware on systems. In this session, attendees will review how FTK can use Cerberus to determine what specific capabilities a binary has and, if necessary, forward those binaries to an expert for further analysis.

Speaker: Chris Sanft, Coordinator Training


Dark Web
The Dark Web is a collection of thousands of websites that use anonymity.  Attendees will gain an understanding of how the Dark Web works, accessing it, and what computer forensic artifacts are left behind are important. This presentation will help attendees understand how the Dark Web works along with bitcoin and how people are using it for criminal activities.

Speaker: Robert Comella, Sr. Instructor

Edge/Cortana Forensics
Microsoft Windows 10 includes many new forensic artifacts. This presentation will introduce attendees to the new artifacts on systems related to the use of the Microsoft Edge browser and Cortana for Internet browsing, and the sharing of files.

Speaker: Todd Careless, Sr. Instructor 

Forensic Analysis of the Windows Journaling Log
NTFS systems have a built-in journaling system to track object transactions. For the investigator, this means that it is possible to see what actions have occurred to files in recent times. This class will examine the function of the logging system, and its value by parsing out the data using the $LogFile, $J, and $MFT objects to show the associated actions of the user.

Speaker: Todd Careless, Sr. Instructor  
macOS Forensics
Many of the artifacts on a Macintosh are contained in binary Plist. Their structure makes it impossible to automatically carve these important artifacts from unallocated space. In this session, attendees will gain an understanding of how to process a Macintosh system.

Speaker: Jim Martin, Sr. Instructor 

Mobile Device Data on Computers
Digital devices are becoming more and more connected each year. This connectivity is not just mobile device to mobile device, but also mobile device to traditional computers and laptops. Computers may hold valuable evidence that may prove useful to an investigation. From the Apple  Continuity features to Window’s Registry, mobile device data can be found. 

Speaker: Nick Jenkins, Sr. Instructor 

Detecting & Attacking TrueCrypt
The use of encryption technology to protect computer data is growing and this presents a challenge for forensic investigators. In this session, you will learn how to utilize the resources you have at your disposal to help in detecting and attacking TrueCrypt encryption.

Speaker: Dustin Hurlbut, Sr. Instructor

Registry Analysis
Registry functionality is an important aspect of forensic analysis. A good understanding of how and why the Registry is used helps to develop an understanding of how and why certain applications create potentially important forensic data.

Speaker: Dustin Hurlbut, Sr. Instructor