WINDOWS FORENSICS AND TOOLS
The Windows Forensics and Tools course focuses on building digital forensics knowledge of Microsoft Windows operating systems, as well as some compatible software or tools that can be used to obtain or process information in such systems.
TIME
4 hours 15 minutes
DIFFICULTY
Beginner
CEU/CPE
4
Course Content
Module 1: Is Windows Forensics Easy?
• 1.1 Course Introduction
7m
• 1.2 Common Myths
9m
• 1.3 Forensic Investigation Methodology
7m
Module 2: Windows Imaging
• 2.1Physical Drive Nomenclature in Windows
4m
• 2.2Logical Drive Nomenclature in Windows
9m
• 2.3Summary of Windows Device Names
4m
Module 3: Imaging with DD
• 3.1Basic dd.exe Operation
10m
• 3.2dd.exe Logical Drive Example
5m
• 3.3Physical Memory
7m
• 3.4Looking at Memory
4m
Module 4: Memory Analysis Tools
• 4.1Memparser
10m
• 4.2Volatility
4m
• 4.3Other Tools
10m
Module 5: Windows Essentials – SID
• 5.1SID (Security Identifier)
7m
Module 6: System Registry
• 6.1Registry Hives
9m
• 6.2New Registry Hives in Windows 8
8m
• 6.3Registry Root Keys
6m
• 6.4Registry Viewer
5m
Module 7: Analysis of Evidence
• 7.1General Registry Info to Look For
7m
• 7.2UserAssist
5m
• 7.3UserAssist Parcer
4m
Module 8: Windows Essentials – Windows Prefetch
• 8.1Windows Prefetch
10m
Module 9: Windows Essentials – Restore Points
• 9.1Registry of the Past
5m
• 9.2Restore Point Data
6m
Module 10: Windows Essentials – Recycle Bin
• 10.1Recycle Bin
10m
Module 11: Reviewing Pertinent Files
• 11.1WORD Forensics
5m
• 11.2Pictures
3m
• 11.3Internet History
3m
Module 12: Windows Artifacts
• 12.1Windows Artifacts Part 1
9m
• 12.2Windows Artifacts Part 2
9m
Module 13: USBSTOR
• 13.1USBSTOR
7m
• 13.2USBDeview
3m
Module 14: Steganography
• 14.1Steganography Tools
6m
• 14.2Steganography Lab
4m
Module 15: E-Mail Forensics
• 15.1E-Mail Forensics
10m
Module 16: Course Summary
• 16.1Course Summary
6m
* THIS COURSE IS JUST FOR EDUCATIONAL PURPOSES I OR THIS COURSE’S OWNER ISN’T RESPONSIBLE FOR ANY OF YOUR DEEDS *
How to download files from our website?
Who this course is for :-
° Anybody interested in learning Window Forensics
° Anybody interested in learning how hackers hack computer systems
° Anybody interested in learning how to secure systems from hackers
° Featured review
We’ve used shortener link service bcz of some peeps out their report our links and get it removed, but we’ve shared a tutorial above how you can download from this links.
NOTE : IF YOU OWN THIS CONTENT AND YOU WANT ME TO REMOVE THIS FROM MY WEBSITE, JUST CONTACT US WITH VALID PROOFS OF YOU OWNING THIS CONTENT & WE’LL REMOVE THIS WITHIN 6 – 12 HOURS….! Must Come With Proofs Else We Never Remove