WINDOWS FORENSICS AND TOOLS [ Free Download ]


WINDOWS FORENSICS AND TOOLS 

The Windows Forensics and Tools course focuses on building digital forensics knowledge of Microsoft Windows operating systems, as well as some compatible software or tools that can be used to obtain or process information in such systems.

TIME

4 hours 15 minutes

DIFFICULTY

Beginner

CEU/CPE

4


Course Content

Module 1: Is Windows Forensics Easy?

• 1.1 Course Introduction

7m

• 1.2 Common Myths

9m

• 1.3 Forensic Investigation Methodology

7m

Module 2: Windows Imaging

• 2.1Physical Drive Nomenclature in Windows

4m

• 2.2Logical Drive Nomenclature in Windows

9m

• 2.3Summary of Windows Device Names

4m

Module 3: Imaging with DD

• 3.1Basic dd.exe Operation

10m

• 3.2dd.exe Logical Drive Example

5m

• 3.3Physical Memory

7m

• 3.4Looking at Memory

4m

Module 4: Memory Analysis Tools

• 4.1Memparser

10m

• 4.2Volatility

4m

• 4.3Other Tools

10m

Module 5: Windows Essentials – SID

• 5.1SID (Security Identifier)

7m

Module 6: System Registry

• 6.1Registry Hives

9m

• 6.2New Registry Hives in Windows 8

8m

• 6.3Registry Root Keys

6m

• 6.4Registry Viewer

5m

Module 7: Analysis of Evidence

• 7.1General Registry Info to Look For

7m

• 7.2UserAssist

5m

• 7.3UserAssist Parcer

4m

Module 8: Windows Essentials – Windows Prefetch

• 8.1Windows Prefetch

10m

Module 9: Windows Essentials – Restore Points

• 9.1Registry of the Past

5m

• 9.2Restore Point Data

6m

Module 10: Windows Essentials – Recycle Bin

• 10.1Recycle Bin

10m

Module 11: Reviewing Pertinent Files

• 11.1WORD Forensics

5m

• 11.2Pictures

3m

• 11.3Internet History

3m

Module 12: Windows Artifacts

• 12.1Windows Artifacts Part 1

9m

• 12.2Windows Artifacts Part 2

9m

Module 13: USBSTOR

• 13.1USBSTOR

7m

• 13.2USBDeview

3m

Module 14: Steganography

• 14.1Steganography Tools

6m

• 14.2Steganography Lab

4m

Module 15: E-Mail Forensics

• 15.1E-Mail Forensics

10m

Module 16: Course Summary

• 16.1Course Summary

6m


* THIS COURSE IS JUST FOR EDUCATIONAL PURPOSES I OR THIS COURSE’S OWNER ISN’T RESPONSIBLE FOR ANY OF YOUR DEEDS *


How to download files from our website?





Who this course is for :-

° Anybody interested in learning Window Forensics

° Anybody interested in learning how hackers hack computer systems

° Anybody interested in learning how to secure systems from hackers

° Featured review


We’ve used shortener link service bcz of some peeps out their report our links and get it removed, but we’ve shared a tutorial above how you can download from this links.




NOTE : IF YOU OWN THIS CONTENT AND YOU WANT ME TO REMOVE THIS FROM MY WEBSITE, JUST CONTACT US WITH VALID PROOFS OF YOU OWNING THIS CONTENT & WE’LL REMOVE THIS WITHIN 6 – 12 HOURS….! Must Come With Proofs Else We Never Remove 

Leave a Comment