Browse  ›  Information & cyber security  ›  Digital Forensics
Icon

Grow your Digital Forensics skills

The field of digital forensics is in high demand due to the constant threat of data breaches and information hacks. Our digital forensics courses walk you through best practices for everything from incident response to deep dives into forensic computing. Learn from expert authors how to identify and remediate vulnerabilities and better communicate breaches to those impacted.

Learn on your own timelineLearn on your own timeline
Master your craftMaster your craft
Keep up with emerging trendsKeep up with emerging trends

Level up your Digital Forensics skills

Learn the latest in digital forensics from experts with real-world experience. Browse our top rated computer forensics training courses and learning paths!

Top Digital Forensics paths

Top Digital Forensics courses

Expanded
Digital Forensics: Getting Started
Course
Digital Forensics: Getting Started
Shoaib Arshad
Beginner
2h 24m
Performing Malware Analysis on Malicious Documents
Course
Performing Malware Analysis on Malicious Documents
Tyler Hudak
Intermediate
2h 59m
Expanded
Digital Forensics: Digital Media Analysis
Course
Digital Forensics: Digital Media Analysis
Pluralsight
Beginner
31m
Malware Analysis Fundamentals
Course
Malware Analysis Fundamentals
Tyler Hudak
Beginner
3h 20m
Incident Forensics: Digital Media Acquisition
Course
Incident Forensics: Digital Media Acquisition
Ricardo Reimao
Beginner
1h 31m
Legal and Ethical Considerations for Digital Forensics
Course
Legal and Ethical Considerations for Digital Forensics
Bobby Rogers
Intermediate
2h 11m
Expanded
Getting Started with Windows Memory Forensics
Course
Getting Started with Windows Memory Forensics
Pluralsight
Beginner
52m
Enumerating the Network Infrastructure as a Forensics Analyst
Course
Enumerating the Network Infrastructure as a Forensics Analyst
Phil Chapman
Intermediate
2h 55m
Malware Analysis: The Big Picture
Course
Malware Analysis: The Big Picture
Christopher Rees
Beginner
2h 13m
PCI DSS: The State of Cardholder Data Attacks
Course
PCI DSS: The State of Cardholder Data Attacks
John Elliott
Intermediate
1h 25m
Setting Up a Malware Analysis Lab
Course
Setting Up a Malware Analysis Lab
Tyler Hudak
Intermediate
1h 25m
Getting Started with Reverse Engineering
Course
Getting Started with Reverse Engineering
Josh Stroschein
Beginner
3h 40m
OS Analysis with RegRipper
Course
OS Analysis with RegRipper
Shoaib Arshad
Intermediate
39m
Vulnerability Analysis with Nessus
Course
Vulnerability Analysis with Nessus
Kevin Cardwell
Intermediate
1h 46m
Trickbot Banking Trojan
Course
Trickbot Banking Trojan
Aaron Rosenmund
Intermediate
1h 29m
Fileless Malware
Course
Fileless Malware
Tyler Hudak
Intermediate
1h 40m
Managing Splunk Enterprise Security Data and Dashboards
Course
Managing Splunk Enterprise Security Data and Dashboards
Joe Abraham
Intermediate
2h 20m
Investigate Network Targets with Nexpose
Course
Investigate Network Targets with Nexpose
Kevin Cardwell
Intermediate
1h 42m
Performing Network Vulnerability Scanning with Nexpose
Course
Performing Network Vulnerability Scanning with Nexpose
Kevin Cardwell
Intermediate
2h 13m
Conducting Network Vulnerability Analysis
Course
Conducting Network Vulnerability Analysis
Kevin Cardwell
Intermediate
2h 27m
Expanded
Getting Started with Packet Analysis
Course
Getting Started with Packet Analysis
Joe Abraham
Beginner
2h 17m
Operationalizing Cyber Threat Intel: Pivoting & Hunting
Course
Operationalizing Cyber Threat Intel: Pivoting & Hunting
Ryan Chapman
Intermediate
2h 34m
Security Event Triage: Monitoring Network Application Services
Course
Security Event Triage: Monitoring Network Application Services
Alan Monnox
Advanced
2h 32m
Threat Intelligence: The Big Picture
Course
Threat Intelligence: The Big Picture
Cristian Pascariu
Beginner
1h 43m
Malware Analysis: Identifying and Defeating Packing
Course
Malware Analysis: Identifying and Defeating Packing
Josh Stroschein
Intermediate
2h 17m
Attacks, Threats, and Vulnerabilities for CompTIA Security+
Course
Attacks, Threats, and Vulnerabilities for CompTIA Security+
Christopher Rees
Beginner
5h 8m
Malware Analysis: Identifying and Defeating Code Obfuscation
Course
Malware Analysis: Identifying and Defeating Code Obfuscation
Josh Stroschein
Intermediate
2h 22m
Expanded
USB Forensics: Fundamentals
Course
USB Forensics: Fundamentals
Philip Polstra
Beginner
2h 9m
Expanded
USB Forensics: Duplication
Course
USB Forensics: Duplication
Philip Polstra
Intermediate
1h 17m
Expanded
USB Forensics: Writeblocking and Impersonation
Course
USB Forensics: Writeblocking and Impersonation
Philip Polstra
Intermediate
1h 16m

The Technology Skills Platform

Pluralsight IQ

Pluralsight IQ

Validate skill levels with assessments that take 5 minutes or less.

Channels

Channels

Curate and share Pluralsight content to reach your learning goals faster.

Hands-on learning

Hands-on learning

Practice and apply knowledge faster in real-world scenarios with projects and interactive courses.

Thousands of courses

Thousands of courses

Keep up with the pace of change with expert-led, in-depth courses.

What is Pluralsight?

Your career is defined by what you know and how well you know it.

With our platform, you can benchmark and prove your knowledge, keep up with emerging trends and build in-demand skills in areas like DevOps, machine learning, cloud, security and infrastructure. 

What our customers are saying

Plans & Pricing

Build skills that deliver results

Monthly Yearly
Save at least {{annual-percent-savings}}%!

Standard

$29.00
per month
$299.00
per year
Core course library,
paths and skill assessments.
  • 10 day free trial
  • Core library access
  • Skill and Role assessments
  • Learning paths and channels

Premium

$49.00
per month
$449.00
per year
Entire library of core and expanded courses, exams, projects and interactive courses.
  • Everything under Standard plus:
  • Expanded library access
  • Certification library access
  • Interactive courses and Projects

Other Digital Forensics Resources

Learn from our expert Digital Forensics authors

Future proof
your skills