Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. H-11 Digital Forensics Organization
  4. X-Ways Forensics

X-Ways Forensics

X-Ways Forensics is a 4-Day training course focused on the systematic and efficient examination of computer media using the integrated computer forensics software X-Ways Forensics. Students will learn complete and systematic methods of the computer forensics features in both WinHex and X-Ways Forensics. This includes: forensically sound disk imaging and cloning, data recovery, thorough overview of existing and deleted files on computer media, theoretical background on slack space, partially initialized space, how to find deleted partitions, what methods X-Ways Forensics finds evidence, search functions, dynamic filtering, report creation, and more! The Hands-on Exercises and the Final Practical Exam will gauge students’ proficiency, skills, and knowledge, preparing them for the X-PERT certification.

Course Overview

Overall Proficiency Level
2 - Intermediate
Course Prerequisites

Intermediate Computer Forensics Training or Experience

Training Purpose
Functional Development
Skill Development
Specific Audience
All
Delivery Method
Classroom
Course Locations

5992 Riverside Drive
Training Classroom
Dallas-Irving, TX 75039

440 West 200 South
Suite 300
Salt Lake City, UT 84101

7000 Columbia Gateway Drive
Suite 150
Columbia - BWI, MD 21046

909 N. Washington St
Suite 300
Alexandria - DCA, VA 21314

Course Location Map
  • Your Location
  • Providers
  • Courses
  • Course and Provider Quantity
  • Classroom

Learning Objectives

Skills Learned

,Learning Objectives ,

  • Getting Started with X-Ways Forensics
  • X-Ways User Interface
  • Creating Disk Images
  • Creating a Case-Adding Evidence Objects Part I
  • Creating a Case-Adding Evidence Objects Part II
  • Creating a Case-Adding Evidence Objects Part III
  • Timestamps Available
  • Recovering-Copying Files
  • Refining Volume Snapshots Part I
  • Refining Volume Snapshots Part II
  • Hash Databases
  • Refining Volume Snapshots Part III
  • Using Search Functions Effectively

    Framework Connections

    The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

    Specialty Areas

    • Digital Forensics
    • Cyber Investigation
    • All-Source Analysis
    • Exploitation Analysis
    • Threat Analysis

    Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

    Feedback

    If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

    Last Published Date: