Windows Forensic Analysis Training Bootcamp

05/06/2019 @ 8:30 am – 05/10/2019 @ 5:00 pm
Reston/Dulles - Instructor-led/Online EST
Virginia USA
Janey Sears
Print Friendly, PDF & Email

Windows Forensic Analysis Training Bootcamp

Windows Forensic Analysis Training Bootcamp Course with Hands-on labs

Windows Forensic Analysis Training Bootcamp focuses on building in-depth digital forensics knowledge of the Microsoft Windows operating systems. You can't protect what you don't know about, and understanding forensic capabilities and artifacts is a core component of information security. Learn to recover, analyze, and authenticate forensic data on Windows systems.

Understand how to track detailed user activity on your network and how to organize findings for use in incident response, internal investigations, and civil/criminal litigation. Use your new skills for validating security tools, enhancing vulnerability assessments, identifying insider threats, tracking hackers, and improving security policies. Whether you know it or not, Windows is silently recording an unimaginable amount of data about you and your users. Windows Forensic Analysis Training teaches you how to mine this mountain of data.

Windows Forensic Analysis Training Bootcamp - Objectives

After completing this Windows Forensic Analysis Training Bootcamp Course, attendees will be able to:

• Conduct in-depth forensic analysis of Windows operating systems and media exploitation focusing on Windows 7, Windows 8/8.1, Windows 10, and Windows Server 2008/2012
• Identify artifact and evidence locations to answer critical questions, including application execution, file access, data theft, external device usage, cloud services, geo-location, file download, anti-forensics, and detailed system usage
• Focus your capabilities on analysis instead of how to use a specific tool
• Extract key answers and build an in-house forensic capability via a variety of free, open-source, and commercial tools provided within the SANS Windows SIFT Workstation


Comments are closed.