EnCase® Forensic solution lets examiners acquire data from a wide variety of devices, unearth potential evidence with disk level forensic analysis, and craft comprehensive reports on their findings, all while maintaining the integrity of their evidence.


The objective of this lab is to provide expert knowledge on conducting large-scale and complex forensics investigation from start to finish using EnCase Forensic.
Forensics Investigation Using EnCase


Five members from the management team of Ace-1 Company were given complete access to the confidential business strategy blueprint during a peak business period to accomplish the task of launching their product as per the designed strategy. Just a day before their product launch date, it was all over the news that their rival company launched a similar product to theirs that also cost less than the market price.


Ace-1 Company called for a board meeting to discuss the issue. An investigator was hired by the company to investigate any fraudulent trading. Upon investigation, they discovered that Daniel (a member of the management team) copied the business strategy blueprint to his pen drive and sent it to the rival company using his personal email id from his laptop. Additionally, the investigator found a suspicious email sent from Daniel's laptop.

Forensics Investigation Using EnCase

Computer Forensics Exercises / Forensics Investigation Using EnCase contains the following Exercises:

  • Forensics Investigation Using EnCase

The Virtual Private Cloud for this Lab set utilizes:

Computer Forensics Exercises are available as part of the following subscription:

Each subscription provides 6 months access to 34 Different Exercises. Each exercise contains a Scenario, Objectives, and individual step by step tasks to guide the user through all steps necessary to complete the exercise. The Computer Forensics Exercises are designed to give the user an ultimate hands-on experience. Each exercise category above has it’s own Virtual Private Cloud that comes preconfigured with Vulnerable websites, Victim Machines, and the environment is LOADED with tools, we even provide investigation files, hard disk clones and targets. Included in your network share are all the supporting tools required to practice in the Cyber Range / Lab environment.

Lab exercises are included for:

  • Computer Forensics Investigation Process
  • Computer Forensics Lab
  • Understanding Hard Disks and File Systems
  • Windows Forensics
  • Data Acquisition and Duplication
  • Recovering Deleted Files and Partitions
  • Forensics Investigation Using AccessData FTK
  • Forensics Investigation Using EnCase
  • Steganography and Image File Forensics
  • Application Password Crackers
  • Log Capturing and Event Correlation
  • Network Forensics, Investigating Logs and Investigating Network Traffic
  • Investigating Wireless Attacks
  • Tracking & Investigating Email Crimes
  • Mobile Forensics
  • Investigative Reports
Price: $199
Add to Cart
View Cart