Network Forensics Expert


The detection, preservation and investigation of evidence or electronic evidence that can be used to defend the company against possible criminal liability is known as computer forensics. This discipline is fundamentally divided into several processes, which can be developed either independently or consecutively, according to the company’s needs.

In the event that the student does not have knowledge of computer security, it is recommended that before taking this course, he completes the introductory course to Computer Security.

Image Source: Modification of “Hard Disc Crash” by Barney Livingstone


Network Forensics Expert


  1. The field of forensic analysis: Types and methodologies
  2. Data recovery:
    • Introduction
    • NTFS
    • EXT
    • LAB 2.1: Ressuscitant fitxers
  3. Device analysis
    • Live Analysis
    • Post-mortem analysis
    • LAB 3.1: Analysis with Autopsy
  4. Analysis of Binaries
    • Environment analysis
    • Code Analysis
    • LAB 4.1: Malicious code

Benefits for the participant

  • Develop the ability to understand and be able to perform forensic analysis of systems, devices and networks.
  • Obtain the recognized Accreditation in Network Security Manager issued by the inLab FIB once the rest of the requirements have been met.
  • Know the different types and methodologies of forensic analysis for effective practice with optimal results.
  • Acquire theoretical and practical knowledge highly valued by the market and ICT departments of all types of public and private organizations.

To whom it is addressed

  • IT security managers and technicians from the ICT departments of organizations who want to be up-to-date in the field of forensic auditing of systems, devices and networks.
  • Computer Science or Telecommunications students who want to orient their career in the area of computer security.
  • Any professional who, meeting the minimum knowledge requirements, is interested in expanding their theoretical and practical knowledge in a subject of increasing importance such as Cybersecurity.