Browse  ›  Information & cyber security  ›  Digital Forensics
Icon

Grow your Digital Forensics skills

The field of digital forensics is in high demand due to the constant threat of data breaches and information hacks. Our digital forensics courses walk you through best practices for everything from incident response to deep dives into forensic computing. Learn from expert authors how to identify and remediate vulnerabilities and better communicate breaches to those impacted.

Learn on your own timelineLearn on your own timeline
Master your craftMaster your craft
Keep up with emerging trendsKeep up with emerging trends

Level up your Digital Forensics skills

Learn the latest in digital forensics from experts with real-world experience. Browse our top rated computer forensics training courses and learning paths!

Top Digital Forensics paths

Top Digital Forensics courses

Incident Forensics: Digital Media Acquisition
Course
Incident Forensics: Digital Media Acquisition
Ricardo Reimao
Beginner
1h 31m
AccessData Forensic Toolkit (FTK) Imager
Course
AccessData Forensic Toolkit (FTK) Imager
Phil Chapman
Beginner
1h 27m
Enumerating the Network Infrastructure as a Forensics Analyst
Course
Enumerating the Network Infrastructure as a Forensics Analyst
Phil Chapman
Intermediate
2h 55m
Legal and Ethical Considerations for Digital Forensics
Course
Legal and Ethical Considerations for Digital Forensics
Bobby Rogers
Intermediate
2h 11m
Specialized DFIR: Windows Registry Forensics
Course
Specialized DFIR: Windows Registry Forensics
Tyler Hudak
Advanced
1h 10m
Host-based Analysis for Cisco CyberOps Associate
Course
Host-based Analysis for Cisco CyberOps Associate
Joe Abraham
Intermediate
1h 36m
Operations and Incident Response for CompTIA Security+
Course
Operations and Incident Response for CompTIA Security+
Christopher Rees
Beginner
3h 56m
OS Analysis with Volatility
Course
OS Analysis with Volatility
Tim Coakley
Intermediate
27m
OS Analysis with The Sleuth Kit & Autopsy
Course
OS Analysis with The Sleuth Kit & Autopsy
Ashley Pearson
Intermediate
15m
Getting Started with Reverse Engineering
Course
Getting Started with Reverse Engineering
Josh Stroschein
Beginner
3h 40m
Threat Intelligence: The Big Picture
Course
Threat Intelligence: The Big Picture
Cristian Pascariu
Beginner
1h 43m
Malware Analysis: Identifying and Defeating Packing
Course
Malware Analysis: Identifying and Defeating Packing
Josh Stroschein
Intermediate
2h 17m
Attacks, Threats, and Vulnerabilities for CompTIA Security+
Course
Attacks, Threats, and Vulnerabilities for CompTIA Security+
Christopher Rees
Beginner
5h 10m
Discover Network Weaknesses with Nessus
Course
Discover Network Weaknesses with Nessus
Kevin Cardwell
Intermediate
1h 45m
Cloud Infrastructure Analysis with Prowler
Course
Cloud Infrastructure Analysis with Prowler
Tim Coakley
Intermediate
24m
Cyber Security Careers for IT Professionals
Course
Cyber Security Careers for IT Professionals
Shoaib Arshad
Beginner
2h 52m
Vulnerability Analysis with Nessus
Course
Vulnerability Analysis with Nessus
Kevin Cardwell
Intermediate
1h 46m
Incident Management with TheHive
Course
Incident Management with TheHive
Nick Mitropoulos
Intermediate
27m
Managing Splunk Enterprise Security Data and Dashboards
Course
Managing Splunk Enterprise Security Data and Dashboards
Joe Abraham
Intermediate
2h 20m
AccessData Registry Viewer
Course
AccessData Registry Viewer
Larry Glusman
Intermediate
1h 10m
File Analysis with TruffleHog
Course
File Analysis with TruffleHog
Tim Coakley
Intermediate
23m
OS Analysis with RegRipper
Course
OS Analysis with RegRipper
Shoaib Arshad
Intermediate
39m
Security Event Triage: Monitoring Network Application Services
Course
Security Event Triage: Monitoring Network Application Services
Alan Monnox
Advanced
2h 32m
Perform Attacks with Metasploit
Course
Perform Attacks with Metasploit
Kevin Cardwell
Intermediate
2h 9m
Analyze Endpoint Data with Elasticsearch 7
Course
Analyze Endpoint Data with Elasticsearch 7
Tim Coakley
Intermediate
1h 32m
Investigate Network Targets with Nexpose
Course
Investigate Network Targets with Nexpose
Kevin Cardwell
Intermediate
1h 42m
Security Event Triage: Analyzing Live System Process and Files
Course
Security Event Triage: Analyzing Live System Process and Files
Cristian Pascariu
Advanced
1h 34m
Malware Analysis: Identifying and Defeating Code Obfuscation
Course
Malware Analysis: Identifying and Defeating Code Obfuscation
Josh Stroschein
Intermediate
2h 22m
Expanded
USB Forensics: Fundamentals
Course
USB Forensics: Fundamentals
Philip Polstra
Beginner
2h 9m
Expanded
USB Forensics: Duplication
Course
USB Forensics: Duplication
Philip Polstra
Intermediate
1h 17m

The Technology Skills Platform

Pluralsight IQ

Pluralsight IQ

Validate skill levels with assessments that take 5 minutes or less.

Channels

Channels

Curate and share Pluralsight content to reach your learning goals faster.

Hands-on learning

Hands-on learning

Practice and apply knowledge faster in real-world scenarios with projects and interactive courses.

Thousands of courses

Thousands of courses

Keep up with the pace of change with expert-led, in-depth courses.

What is Pluralsight?

Your career is defined by what you know and how well you know it.

With our platform, you can benchmark and prove your knowledge, keep up with emerging trends and build in-demand skills in areas like DevOps, machine learning, cloud, security and infrastructure. 

What our customers are saying

Plans & Pricing

Build skills that deliver results

Monthly Yearly
Save at least {{annual-percent-savings}}%!

Standard

$29.00
per month
$299.00
per year
Core course library,
paths and skill assessments.
  • 10 day free trial
  • Core library access
  • Skill and Role assessments
  • Learning paths and channels

Premium

$49.00
per month
$449.00
per year
Entire library of core and expanded courses, exams, projects and interactive courses.
  • Everything under Standard plus:
  • Expanded library access
  • Certification library access
  • Interactive courses and Projects

Other Digital Forensics Resources

Future proof
your skills