Free
DFIR Operator Series: Windows Forensics 101
Created for learners to analyze and triage Windows systems (including artifacts and indicators of compromise) and review Operating Systems at a detailed level. Allows learners to apply critical thinking to various steps of forensics investigations (of Windows based systems) and communicate those findings to stakeholders and executive leadership.
4
H
6
M
Time
intermediate
difficulty
4
ceu/cpe
Course Content
Artifact Overview (Video)
Analysis
Overview of DFIR (Video)
Digital Forensics Incident Response: Overview
Overview of Data Collection (Video)
Data Collection
DFIR: Examination Phase (Video)
Examination
Windows NTFS & FAT Filesystem (Video)
Windows Artifacts
DFIR Operator Program Outline
What is DFIR?
Windows NTFS & FAT Filesystem (Video)
Windows Artifacts
DFIR: Reporting & Wrapping Up
Capstone
DFIR Overview: Analysis (Video)
Analysis
Ways We Connect and Support You
What is DFIR?
People, Process, and Technology (Text)
Digital Forensics Incident Response: Overview
Collecting the Data: Chain of Custody (Text)
Data Collection
Examination Phase (Text)
Examination
Disk Analysis Process (Video)
Analysis
Working with Powershell (Text)
Analysis
Capstone Lab Activity
Capstone
Lab #8: Memory Forensics
Memory
Final Capstone Lab
Capstone
Windows NTFS: $MFT (Video)
Windows Artifacts
Introduction to Digital Forensics (Video)
What is DFIR?
Incident Response Lifecycle and DFIR Process (Reading)
Digital Forensics Incident Response: Overview
Order of Volatility and Post Data Collection (Text)
Data Collection
Artifact Collection (Reading)
Examination
Course Description
Created for learners to be able to analyze and triage Windows systems (including specific artifacts and indicators of compromise) and review Operating Systems at a detailed level. This course allows learners a chance to applying critical thinking to various steps of forensics investigations (of Windows based systems) and communicate those findings to stakeholders and executive leadership.