Publication date : 05/13/2024

Course : Forensics Windows

Practical course - 5d - 35h00 - Ref. FOH
Price : 3120 € E.T.

Forensics Windows




After a computer attack, forensic investigation is used to collect and analyze evidence for legal proceedings. The main objective is therefore to recover and analyze data proving a digital crime.


INTER
IN-HOUSE
CUSTOM

Practical course in person or remote class
Disponible en anglais, à la demande

Ref. FOH
  5d - 35h00
3120 € E.T.




After a computer attack, forensic investigation is used to collect and analyze evidence for legal proceedings. The main objective is therefore to recover and analyze data proving a digital crime.


Teaching objectives
At the end of the training, the participant will be able to:
Managing a digital investigation on a Windows computer
Analyze intrusion a posteriori
Collect and preserve the integrity of electronic evidence

Intended audience
People wishing to get started in computer forensics. Windows system administrators. Computer law experts.

Prerequisites
A solid grounding in information systems security.

Practical details
Hands-on work
Training alternates theory and practice. Everything we learn is put into practice.

Course schedule

1
Inforensics presentation

  • Scope of investigation.
  • Toolkit, methodology "First Responder" and Post-mortem analysis.
  • Hard disks, introduction to file systems and time stamps.
  • Data acquisition (persistent and volatile) and encrypted media management.
  • Search for deleted data.
  • Backups, Volume Shadow Copies and flash storage hazards.
  • Windows registers and register structures.
  • Analysis of logs, events / antivirus / other software.

2
Investigation scenario

  • Download/access confidential content.
  • Program execution, file and folder manipulation traces.
  • Deleted files, unallocated space and carving.
  • Geolocation and photographs (Exifs data).
  • SMTP logs: server-side acquisition, mail client analysis.
  • WiFi access points and USB devices.
  • HTML5, emails and users abused by malware.
  • Exfiltration of information.

3
Interaction on the Internet

  • Office 365.
  • Sharepoint.
  • Traces on Windows ADs.
  • Presentation of the main artifacts.
  • Basics of RAM analysis.
  • Use of Internet browsers.
  • Chrome / IE / Edge / Firefox.

4
Linux forensics

  • The basics of inforensics on a Linux workstation.
  • The basics of inforensics on a Linux server: Web server logs & file system correlations.
  • Creation and analysis of a file system timeline.

5
Overview

  • Creation and analysis of a timeline enriched with artifacts.
  • Example of tools for querying large volumes of data.


Dates and locations
Select your location or opt for the remote class then choose your date.
Remote class

Dernières places
Date garantie en présentiel ou à distance
Session garantie

REMOTE CLASS
2026 : 16 Mar., 15 June, 28 Sep., 7 Dec.

PARIS LA DÉFENSE
2026 : 16 Mar., 15 June, 28 Sep., 7 Dec.