@ 2023 Cyber Dojo. All rights reserved.
Description
Curriculum
Instructor
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Windows Forensic Examiner course. This course equips participants with advanced forensic analysis skills specifically for Microsoft Windows operating systems. This hands-on course focuses on identifying, recovering, and analyzing various forensic artifacts across Windows 7 to 11. By leveraging real-world scenarios and the latest tools, students will learn to conduct thorough investigations into cybercrimes, insider threats, and data breaches. The course emphasizes the importance of understanding Windows telemetry and empowers analysts to derive actionable insights from vast amounts of forensic data.
- Key Components of Windows Forensic Examiner:
- In-depth Windows Forensic Analysis: Engage in practical exercises with Windows 7, 8/8.1, 10, 11, and Windows Server products to gain hands-on experience in forensic analysis.
- Tool Agnostic Approach: Emphasis on analytical skills over specific tools, making the knowledge transferable across various forensic platforms.
- Real-World Scenarios: Utilizes case studies and data from actual investigations to enhance learning relevance.
- Advanced Forensic Tools and Methods: Learn to conduct detailed analysis of actions on Windows systems, focusing on program execution, cloud storage usage, and user activity.
- Rapid Assessment Techniques: Develop quick forensic methods that support timely business decisions during incident investigations.
- Comprehensive Artifact Coverage: Explore a wide range of artifacts, including ShellBags, Jump Lists, browser history, and email forensics to uncover user actions and system interactions.
- Data Recovery Skills: Acquire techniques to recover data from various sources, including deleted registry keys and databases, enhancing your ability to retrieve vital information.
- Windows Operating Systems and File Systems: Understand the intricacies of NTFS, FAT, and exFAT file systems and their relevance in forensic investigations.
- Evidence Acquisition and Registry Forensics: Master the techniques for acquiring digital evidence and analyzing the Windows Registry to uncover user activities.
- Shell Item and Shortcut File Analysis: Learn to analyze Shell Items and shortcuts to trace user interactions and file access patterns.
- Browser and Webmail Analysis: Gain expertise in analyzing browser history and webmail activity to gather intelligence on user behavior.
- Microsoft Office Document and Cloud Storage Forensics: Explore methods for examining Office documents and cloud storage usage to identify potential data exfiltration and other relevant activities.
- Event Log Analysis and Data Recovery: Develop skills in analyzing Windows Event Logs and executing data recovery techniques to reconstruct user actions and recover lost information.
- Hands-On Training:
- The course offers extensive lab-based exercises, providing students with practical experience applying course concepts.
- Labs are based on real-world scenarios, allowing students to grasp the challenges they’ll face in their careers.
- Certification Opportunity:
- You can obtain the GCFE and certification validating the acquired skills and knowledge
Get the course now to unlock the gateway to a thriving and lifelong career in Cybersecurity.
Certificate Sample..
————————————————————————
- Important Notice:
- This course is independent and not sponsored, endorsed, or affiliated with organizations such as IBM, SANS, INE, Microsoft, Cisco, and others.
- This course is presented as a prerecorded program, offering flexibility for learners to access the content at their own pace and convenience.
- The modules are designed to be consumed in a sequential manner, allowing participants to navigate through the material at a time that suits their individual schedules.
- Please note that being prerecorded, the course does not involve live, real-time interactions with instructors except through the one-to-one support sessions.
- Participants can pause, rewind, and replay the content as needed to enhance their understanding of the subject matter.
- It includes opportunities for open discussion through dedicated discussion boards that enable participants to engage with peers, share insights, and ask questions related to the course content
————————————————————————
:إشعار مهم
هذا الكورس مستقل وليس برعاية أو مصادقة أو مرتبط بمنظمات مثل اي بي ام او سانز او اي ان اي او مايكروسوفت اوسيسكو او غيرهم من المنظمات
يتم تقديم هذا الدورة كبرنامج تم تسجيله مسبقًا، مما يوفر مرونة للمتعلمين للوصول إلى المحتوى بوتيرتهم وراحتهم
تم تصميم الوحدات لتكون مستهلكة بطريقة تسلسلية، مما يتيح للمشاركين التنقل في المواد في وقت يناسب جداولهم الفردية
يرجى ملاحظة أنه نظرًا لأنها مسجلة مسبقًا، لا تشمل الدورة تفاعلات حية في الوقت الحقيقي مع المدرسين باستثناء عن طريق جلسات الدعم الفردية
يمكن للمشاركين إيقاف التشغيل والترجيع وإعادة تشغيل المحتوى حسب الحاجة لتعزيز فهمهم للموضوع
تتضمن الدورة فرصًا للنقاش المفتوح من خلال لوحات نقاش مخصصة تمكن المشاركين من التفاعل مع الزملاء، ومشاركة الأفكار، وطرح الأسئلة المتعلقة بمحتوى الدورة
Curriculum
- 8 Sections
- 54 Lessons
- 52 Weeks
Expand all sectionsCollapse all sections
- Introduction to Cyber Dojo Platform3
- Chapter 1: Digital Forensics and Advanced Data Triage14
- 2.1Introduction to Windows Forensic Examiner Curriculum15 Minutes
- 2.2Windows Forensic Examiner Material5 Minutes
- 2.3The Fred Rocba Case14 Minutes
- 2.4Core Windows Forensics: Focus on Analysis49 Minutes
- 2.5Mounting Disk Images5 Minutes
- 2.6Windows SIFT Workstation VM Setup8 Minutes
- 2.7Lab 1.1: Mounting Disk Images Using Arsenal Image Mounter23 Minutes
- 2.8Memory and Triage Acquisition29 Minutes
- 2.9Introducing KAPE – Triage and Rapid Analysis Capability31 Minutes
- 2.10Lab 1.2: Triage Imaging with KAPE20 Minutes
- 2.11Lab 1.3: Mounting Triage VHDX Evidence4 Minutes
- 2.12Filesystem Overview2 Hours
- 2.13Lab 1.4: Memory Carving with AXIOM46 Minutes
- 2.14Quiz: Recovering Deleted Files60 Minutes3 Questions
- Chapter 2: Registry Analysis, Application Execution, and Cloud Storage Forensics15
- 3.1Registry Essentials40 Minutes
- 3.2User/Group Information Analysis9 Minutes
- 3.3Lab 2.1: User Account Profiling15 Minutes
- 3.4System Configuration Analysis36 Minutes
- 3.5Lab 2.2: System Profiling29 Minutes
- 3.6Analyzing User File Activity25 Minutes
- 3.7Lab 2.3: NTUSER.DAT Analysis39 Minutes
- 3.8Application Execution44 Minutes
- 3.9Lab 2.4: Application Execution Analysis37 Minutes
- 3.10Cloud Storage Forensics – OneDrive27 Minutes
- 3.11Lab 2.5: Cloud Storage Forensics – OneDrive26 Minutes
- 3.12Cloud Storage Forensics – Google14 Minutes
- 3.13Lab 2.6: Cloud Storage Forensics – Google33 Minutes
- 3.14Cloud Storage Forensics – Dropbox & Box12 Minutes
- 3.15Quiz: Registry Analysis, Application Execution, and Cloud Storage Forensics2 Hours38 Questions
- Chapter 3: Shell Items and Removeable Device Profiling7
- 4.1Shell Items Overview & Shortcut Files (.lnk)55 Minutes
- 4.2Lab 3.1: LNK Shell Item Analysis28 Minutes
- 4.3Jumplist and Shellbags51 Minutes
- 4.4Lab 3.2: Jumplist and Shellbags Shell Item Analysis49 Minutes
- 4.5USB Device Forensic Analysis40 Minutes
- 4.6Lab 3.3: USB Analysis22 Minutes
- 4.7Quiz: Shell Items and Removeable Device Profiling90 Minutes14 Questions
- Chapter 4: Email Analysis, Windows Timeline, SRUM, and Event Logs9
- 5.1Email Forensic Analysis4 Hours
- 5.2Lab 4.1: Email Forensics1 Hour
- 5.3Additional Windows Artifacts2 Hours
- 5.4Lab 4.2: Windows Timeline and Recycle Bin Analysis57 Minutes
- 5.5SRUM1 Hour
- 5.6Lab 4.3: SRUM Analysis55 Minutes
- 5.7Event Log Analysis2 Hours
- 5.8Lab 4.4: Event Log Analysis1 Hour
- 5.9Quiz: KAPE60 Minutes6 Questions
- Chapter 5: Web Browser Forensics9
- 6.1Processing Data with KAPE5 Minutes
- 6.2Lab 5.1: Automating Artifact Processing with KAPE13 Minutes
- 6.3Chrome Forensics Analysis3 Hours
- 6.4Lab 5.2: Chrome Browser Forensics58 Minutes
- 6.5Microsoft Edge and IE Forensics3 Hours
- 6.6Lab 5.3: Edge and Internet Explorer Analysis42 Minutes
- 6.7Firefox Forensics2 Hours
- 6.8Lab 5.4: Firefox Forensics43 Minutes
- 6.9Quiz: Browser Forensics — Cryptominer60 Minutes8 Questions
- Final Exam1
- Project: The Case of the Abducted Zebrafish3
Review
Digital Forensics, Incident Response & Threat Hunting

400 $
300 $
100% positive reviews
66 students
54 lessons
Language: Arabic
6 quizzes
Assessments: Self
Granted Access Time: 52 weeks
Skill level Intermediate
Features
- - Based on FOR500 Version 2024
Courses you might be interested in
Cyber Defense
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Security Operations Analyst course. This course equips learners with foundational skills and knowledge necessary to operate...
-
87 Lessons
Offensive Operations, Pen Testing, and Red Teaming
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Enterprise Penetration Tester course. This course equips participants with the essential skills and techniques for conducting...
-
116 Lessons
Digital Forensics, Incident Response & Threat Hunting
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Windows Forensic Examiner course. This course equips participants with advanced forensic analysis skills specifically for...
-
54 Lessons
Cybersecurity and IT Essentials
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Cybersecurity Essentials course. This course delves into the fundamental principles of computer and information security, empowering...
-
97 Lessons
Offensive Operations, Pen Testing, and Red Teaming
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Web Application Penetration Tester course. This course equips participants with the skills to conduct thorough web...
-
114 Lessons
Upcoming Events
Most Popular Blog
From PICERL to DAIR: The New Incident Response Process with a Flexible Approach
May 17, 2024
No Comments
Read More »
Most Popular Course
-
97 Lessons
Cybersecurity and IT Essentials
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Cybersecurity Essentials course. This course delves into the fundamental principles of computer and information security, empowering...