Menu

Specialisation in Forensic Analysis

Live online classes

October 2025

3 months

Prior knowledge is required

We prepare you for certification

Study plan

Documentation and reporting of forensic analysis
  • Identify the differences between forensic expert reports and forensic technical reports.
  • The structure of expert reports and technical reports.
  • The importance of ISO27037 for expert reports
  • The role of the expert report and the expert.
  • The ethics and impartiality of experts.
  • The importance of digital evidence
  • Fundamental rights in investigations
  • Phases of forensic expertise
  • The chain of custody
Fundamentals of evidence acquisition

The starting point in any forensic investigation is the collection of evidence. The digital evidence used in this type of forensic investigation is data, which can be found in a wide range of formats and locations.

In the first instance, it is necessary to identify the data that may be required, establish where it is housed, and finally develop a strategy and procedures for its collection. This unit will cover digital acquisition and data processing, the skills required to respond appropriately, identify, collect and retain data from a wide range of storage devices ensuring that the integrity of the evidence is beyond reproach.

  • Rapid collection of incident response artefacts to move forward
  • quickly in the investigation without waiting for the completion of a forensic image.
  • Remote and enterprise-wide collection of digital evidence.
  • Collection of artefacts from Windows operating systems.
  • Compilation of memory.
  • Acquisition of volume snapshots.
  • Understanding of advanced storage containers such as RAID and JBOD.
  • Analysis of file systems and how they store data.
  • Advanced understanding of proper evidence collection and scene management.
  • Identification of devices and data storage locations.
  • Access to storage media by non-destructive methods.
  • Access and collection of cloud-based storage containers.
  • Methodologies for accessing and acquiring data from IoT devices.
Advanced security fundamentals for investigations

This unit will teach you how to apply a dynamic approach to incident response. Using indicators of compromise, you will learn the steps to effectively respond to security breaches affecting Windows systems, Linux and cloud platforms. For forensic investigators, it is very important to know the tactics, techniques and procedures of attackers, in order to know what to investigate and above all, to communicate findings to incident managers.

  • Apply a dynamic approach to incident response.
  • Identify threats through host, network and log analysis.
  • Best practices for effective incident response in the cloud.
  • Cyber investigation processes using live analysis, network awareness and forensic memory analysis.
  • How attackers are leveraging cloud systems against organisations.
  • Attackers' techniques to circumvent endpoint detection tools.
  • How attackers exploit complex vulnerabilities in the cloud.
  • Attackers' steps for internal discovery and lateral movement after initial engagement.
  • How attackers exploit publicly accessible systems, including Microsoft 365.
Windows Systems Forensics

ThreatHunting tactics and procedures is one of the skills a forensic analyst with advanced capabilities must have. Incident response teams where forensic investigators work are the key to identifying and observing malware indicators and activity patterns in order to generate accurate threat intelligence that can be used to detect current and future intrusions.

This in-depth course on threat hunting on Windows systems provides advanced skills to hunt, identify, counter and recover from a wide range of threats within enterprise networks.

  • Techniques and procedures necessary to effectively hunt, detect and contain a variety of adversaries, as well as to remediate incidents.
  • Detect and hunt for live, latent and unknown custom malware in memory on Windows systems.
  • Determine how the breach occurred by identifying the root cause.
  • Identify life-on-earth techniques, including malicious use of PowerShell and WMI.
  • A Identify advanced anti-forensic techniques of adversaries.
  • Identify lateral movement techniques from a forensic point of view on Windows systems with all forensic artefacts.
  • Understand how the attacker acquires legitimate credentials, including domain administrator rights.
  • Timeline analysis.
Linux Systems Forensics

Linux-based systems are widely deployed both in
cloud platforms as well as on-premises systems.

  • The use of forensic artefact collection tools.
  • Log analysis of the main daemons.
  • File System Analysis.
  • Identification of file and binary deletion.
  • Identification of the process tree.
  • Recovery with Bul Extractor.
  • Memory analysis.
  • Identification of backdoors and persistent malware.
Analysis techniques in Cloud platforms

Today, businesses have thousands of systems, from desktops to servers, from on-premises to the cloud. While geographic location and network size have not deterred attackers from breaching their victims, these factors pose unique challenges for organisations to successfully detect and respond to security incidents.

It is important for the forensic analyst to focus on the concepts: collecting, analysing and making decisions based on information from hundreds of machines. This requires the ability to automate and the ability to quickly focus on the right information for analysis. Using tools built to operate on an enterprise scale, students will learn the techniques to collect data specific to threat hunting.

Students will then delve deeper into analysis methodologies, learning multiple approaches to understanding the movement and activity of attackers on hosts with different functions and operating systems using chronological, graphical, structured and unstructured analysis techniques.

  • Deploy mass forensic collaboration and analysis platforms that allow teams to work simultaneously in different rooms, states or countries.
  • Collect host and cloud-based forensic data from large environments.
  • Analyse best practices for responding to Azure, M365 and AWS cloud platforms.
  • Analyse containerised microservices, such as Docker containers.
  • Correlate and analyse data across multiple data types and machines using a myriad of analysis techniques.
  • Perform analysis of structured and unstructured data to identify attacker behaviour.
  • Enrich the data collected to identify additional indicators of engagement.
  • Develop IOC signatures and analysis to expand search capabilities and enable rapid detection of similar incidents in the future.
Smartphone Forensics
  • Selecting the most effective forensic tools, techniques and procedures to
  • effectively analyse smartphone data for Android and iOS.
  • Understanding how file systems store data on smartphones
    Android and IOS, how they differ and how the evidence will be stored in each
    device.
  • Interpret the file systems on Android and IOS smartphones and locate the
    information to which users do not usually have access.
  • Linking a user to a smartphone at a specific date/time and across multiple
    sites
  • Detect Android and IOS compromised by malware and spyware using forensic methods.
  • Decompile and analyse mobile malware using open source tools.
  • Handling smartphone encryption and decrypting iOS backup files
    encrypted with iTunes.
  • Analysing SQLite databases and raw data dumps from smartphones
    to recover deleted information.
  • Apply advanced data analysis techniques on smartphones to validate the
    results and extract lost or deleted data.
Capstone Project Presentation

Presentation of the final project before a panel of experts.

*The academic program may be subject to changes in line with the changing demand for specific skills in the market. Your employability is our goal.Download the brochure here
ElizaCareer opportunities

Digital Forensic Analyst | Incident Response Specialist | Threat Hunter | Forensic & Security Consultant

Certifications
Cisco Certified CCST Cybersecurity
Cisco Certified CCST Networking
IT Specialist Cybersecurity
Microsoft Certified: Security, Compliance and Identity Fundamentals SC-900
IMMUNE Technology Institute - Specialisation in Forensic Analysis

Certification training

With this programme you will acquire the necessary skills to work in a professional environment. In order for you to be able to demonstrate this, IMMUNE prepares you to be certified in:

Cisco Certified CCST Cybersecurity

Cisco Certified CCST Networking

IT Specialist Cybersecurity

Microsoft Certified: Security, Compliance and Identity Fundamentals SC-900

Specialisation in Forensic Analysis

The programme is designed to train experts in the acquisition and forensic analysis of digital evidence, as well as advanced response to cybersecurity incidents.

Through a practical and comprehensive approach, participants will learn how to apply forensic investigation methodologies in Windows, Linux, mobile devices, IoT and Cloud platforms, ensuring the integrity of digital evidence.

The programme addresses fundamental and advanced topics, from technical documentation and reporting to forensic analysis in complex and distributed systems, providing the skills needed to lead digital investigations in enterprise environments."

Prerequisites
  • Successful completion of the Bootcamp or the Master in Cybersecurity at IMMUNE.
  • Cybersecurity or IT experience: At least 2-3 years of experience in roles related to information security, system or network administration.
  • Forensics Basics: Familiarity with fundamental concepts of digital forensics and incident response.
  • Operating Systems Skills: Knowledge of Windows and Linux system administration.
  • Understanding Networking and Security: Understanding network protocols, system architecture and good computer security practices.
  • Programming and Scripting Skills: Ability to write scripts in languages such as Python, PowerShell or Bash.
  • Previous Certifications (Recommended, not mandatory): Initial certifications in cybersecurity or digital forensics, such as Certified Ethical Hacker (CEH), or certificates specific to Cloud platforms (AWS, Azure, GCP).
Program aims
  • Develop advanced skills in Forensic Analysis: Master the acquisition, analysis and preservation of digital evidence in various technological environments, ensuring the integrity of evidence and the chain of custody.
  • Implement incident response methodologies: Apply advanced incident response strategies in Windows, Linux, mobile devices, IoT and Cloud environments, using best practices and specialised tools.
  • Strengthen cyber security in investigations: Identify and analyse threats using advanced Threat Hunting techniques, malware detection and forensic analysis of memory and file systems.
  • Produce high quality expert reports: Develop skills in the documentation and presentation of expert reports with technical and legal rigour, complying with regulations such as ISO27037.
  • Manage enterprise-wide forensic analysis projects: Coordinate forensic analysis teams and projects in complex enterprise environments, ensuring efficient data collection and analysis.
Career Readiness

The comprehensive training we deliver to our students thoroughly prepares them for the employment market. Through a personalized syllabus, we help them develop professional skills, establish relationships with companies and sail through recruitment processes.

An alternative training

In all our content, we include a percentage of Human Sciences to connect technology with soft skills.

Learning By Doing Methodology

It focuses on the practical application of knowledge and skills to foster meaningful and lasting learning.

Learning paths

With IDEIA, we design customized learning paths, tailored to your experience and goals. This ensures efficient progress, focused on what you truly need.

Our learning paths guide you from beginner level to becoming an expert in your chosen field. They are structured yet flexible routes, paced to suit you, so you can reach your full personal and professional potential.

Learning paths
CybertalentIncibe

Cybertalent

Do you have a cybersecurity-related project that you would like to develop? Have you identified a cybersecurity need? Do you need funding to launch your company? IMMUNE, in collaboration with INCIBE, is developing the CYBERTALENT program, a three-year plan to promote cybersecurity entrepreneurship in Spain.

Find out more
Cybertalent map
Seedbed Incubator
Business Accelerator
Catchment
Phase 1: Recruitment / Ideation
Get ready through our events
Incubation
Phase 2: Seedbed Incubator
Develop your idea and get it up and running
Acceleration
Phase 3: Acceleration
Grow your business with the support of Incibe
Funded by the European Union NextGenerationEUSpanish GovernmentRecovery, Transformation and Resilience PlanIncibeIncibeIMMUNE Technology Institute

Admission test

This questionnaire will allow us to get to know your profile in depth and ensure that this course is perfectly suited to your level of knowledge and expectations, guaranteeing that you get the most out of our program.

Why should you take the test?
  • To assess your prior knowledge.
  • To ensure that this course is the right fit for you.
  • To offer you a personalized and unique learning experience.
How does it work?

The test is completely online, requires no prior preparation, and will take no more than 25 minutes.

Take the test

Financing

Sequra

Sequra

Pay in installments, even if you are unemployed and cannot guarantee the loan.

Sequra

Quotanda

Pay in installments, even if you are unemployed and cannot guarantee the loan.

Quotanda

Fundae

Pay for your training through the Spanish Employment Training Foundation. Aimed at active workers who wish to finance their program through the subsidized training program.

Fundae

FAQs

What certification or qualification will I receive on completion of the course?

Once you complete and pass the programme you will receive a diploma issued by IMMUNE Technology Institute in a digital format verifiable through blockchain technology.

Is this programme for me?

Do you want to level up?

Do you want to stay in your field or sector, but you want to continue learning and explore new challenges? It's time to give your professional profile a boost and align it with the latest trends in technology.

Are you finishing your degree, and you want an upgrade in technology?

We love your profile, because you dare to dream. And in the professional world, fortune favors the bold. If you are an entrepreneur or freelancer, this program will help take your professional projects to the next level.

Want to change your professional career?

If you want your career to take a new direction and enter the world of tech with a bang, the program will help you specialize and shape your professional profile.

Are you an entrepreneur or freelancer?

This program will put you in the spotlight, as technology is the engine of innovation and the key to staying competitive in a constantly evolving market.

What are the admission requirements?

It is not necessary to demonstrate any prior training for admission, only to go through the admission process consisting of an evaluation of your resume and a personal interview with our admissions team.

Will the tools I need be included in the price of the program?

The tools used throughout the program are licensed for free use, in some cases because we use educational licenses and in others because it is free software.

Is there a careers and employment guidance service?

We have an employability area which, through our Talent Hub program, is responsible for supporting the efforts of our students to enter the employment market. The services we offer include resources to help you search for and prepare for interviews, English tests, resume and/or Linkedin profile guidance, interview and elevator pitch training, and access to our exclusive internship and employment pool.

What are the requirements for my computer?

You will need to have access to a laptop with a camera, microphone and minimum requirements of 8 GB of RAM and an i5 processor.

What is the Capstone Project?

The final project is where everything you have learned throughout the program is applied and consolidated. You will present the project to a panel of professionals from companies in the sector, which represents a unique opportunity for students to demonstrate their knowledge to potential employers and also to network.

Can the course be delivered online?

Yes, the program is delivered online with live classes. As such, you will be in direct contact and under the supervision of the teachers, which will enable you to follow the classes and interact in a flexible and natural way.

Are there grants or scholarships available?

Yes, there are scholarships or study grants as well as financing options depending on students’ circumstances. Check out our scholarship and financing options.

Admissions Process

Our students are characterized by their passion for technology. Our admissions process focuses on who you are, how you think, what you have accomplished, and then sharing your goals.

Our aim is to get to know you better, see what makes you unique and ensure that the IMMUNE educational model adapts to your profile.

1. Application

3. Academic committee

4. Enrollment

2. Personal interview

Request information

Visit our Campus in Madrid and discover everything about our programmes

  • Personalised guidance Monday to Friday.
  • Intake now open for March, September and October.

Designed to replicate an ecosystem of start-ups and tech companies, we’ve created a slice of Silicon Valley in the heart of Madrid.

Find out more
+2000m²
Paseo de la Castellana, 89
Co-working spaces
Meeting rooms
Rest areas
Digital classrooms
Auditorium
Recording studio