Publication date : 03/15/2024

Course : Forensic analysis

Practical course - 3d - 21h00 - Ref. AFB
Price : 2100 € E.T.

Forensic analysis




Post-mortem analysis (also known as inforensic) of IT security incidents has become essential for preserving evidence. Following simulated attacks, you will learn how to collect and preserve evidence, analyze it and improve IS security after the intrusion.


INTER
IN-HOUSE
CUSTOM

Practical course in person or remote class
Disponible en anglais, à la demande

Ref. AFB
  3d - 21h00
2100 € E.T.




Post-mortem analysis (also known as inforensic) of IT security incidents has become essential for preserving evidence. Following simulated attacks, you will learn how to collect and preserve evidence, analyze it and improve IS security after the intrusion.


Teaching objectives
At the end of the training, the participant will be able to:
Master the right reflexes in the event of machine intrusion
Collect and preserve the integrity of electronic evidence
Analyze intrusion a posteriori

Intended audience
Systems and network engineer/administrator.

Prerequisites
Good knowledge of IT security and networks/systems. Must have taken the course "Collecting and analyzing logs, optimizing your IS security".

Course schedule

1
How do you manage an incident?

  • Signs of successful IS intrusion.
  • What have the hackers achieved? How far did they get?
  • How do you react to a successful intrusion?
  • Which servers are affected?
  • Find the entry point and fill it.
  • The Unix/Windows toolbox for evidence retrieval.
  • Clean-up and return compromised servers to production.

2
Analyze incidents for better protection: Forensic analysis

  • Computer forensics: types of computer crime, role of the computer investigator.
  • Modern cybercrime.
  • Digital proof.

3
Forensic analysis of a Windows operating system

  • Acquisition, analysis and response.
  • Understanding start-up processes.
  • Collect volatile and non-volatile data.
  • How the password system and Windows registry work.
  • Analysis of data contained in RAM and Windows files.
  • Cache analysis, cookie and browsing history, event history.
Hands-on work
User injection. Break password. Collect, analyze RAM data. Reference and hash all files. Explore browser and registry data.


Customer reviews
4,8 / 5
Customer reviews are based on end-of-course evaluations. The score is calculated from all evaluations within the past year. Only reviews with a textual comment are displayed.
DJELLAL H.
15/12/25
5 / 5

Très satisfait
XAVIER N.
15/12/25
5 / 5

Le contenu pédagogique est merveilleusement bien chapitré.Chaque TP est une mise en pratique du cours magistral que l’intervenant, Yoann BERTRAND, nous transmet au compte goute.Son contenu est également agrémenté avec des documents annexes mis à disposition pour notre curiosité intellectuelle.Un remerciement très sincère pour notre intervenant passionné !
JOEL S.
15/12/25
5 / 5

En effet, le formateur est clair et les tp très concrets



Dates and locations
Select your location or opt for the remote class then choose your date.
Remote class

Dernières places
Date garantie en présentiel ou à distance
Session garantie

REMOTE CLASS
2026 : 18 Mar., 8 June, 16 Sep., 12 Oct., 23 Nov.

PARIS LA DÉFENSE
2026 : 18 Mar., 8 June, 16 Sep., 12 Oct., 23 Nov.