Free
DFIR Operator Series: Windows Forensics 101
Created for learners to analyze and triage Windows systems (including artifacts and indicators of compromise) and review Operating Systems at a detailed level. Allows learners to apply critical thinking to various steps of forensics investigations (of Windows based systems) and communicate those findings to stakeholders and executive leadership.

4
H
6
M
Time
intermediate
difficulty
4
ceu/cpe
Course Content
Artifact Collection (Reading)
Examination
Incident Response Lifecycle and DFIR Process (Reading)
Digital Forensics Incident Response: Overview
Order of Volatility and Post Data Collection (Text)
Data Collection
Introduction to Digital Forensics (Video)
What is DFIR?
Lab #3: $MFT Parsing
Windows Artifacts
Lab #3: $MFT Parsing (Overview Video)
Examination
Lab #5: Registry Analysis
Analysis
Lab Test
Capstone
Lab #1: Disk Acquisition (Overview Video)
Data Collection
Post Lab Takeaways & Closing Thoughts
Examination
IR and DFIR Methodology (Reading)
What is DFIR?
Lab #1: Disk Acquisition
Data Collection
Windows File System (Text)
Windows Artifacts
Post Lab Takeaways & Closing Thoughts
Data Collection
Lab #6: MFT Analysis
Analysis
Windows Registry Overview (Video)
Windows Artifacts
Windows Shellbags & Amcache (Text)
Windows Artifacts
Lab #4: Parsing Registry Files (Overview Video)
Windows Artifacts
Lab #4: Parsing Registry Files
Windows Artifacts
Lab #7: EVTX Analysis
Analysis
Course Description
Created for learners to be able to analyze and triage Windows systems (including specific artifacts and indicators of compromise) and review Operating Systems at a detailed level. This course allows learners a chance to applying critical thinking to various steps of forensics investigations (of Windows based systems) and communicate those findings to stakeholders and executive leadership.