Publication date : 03/15/2024

Course : Forensic analysis

Practical course - 3d - 21h00 - Ref. AFB
Price : 2470 CHF E.T.

Forensic analysis




Post-mortem analysis (also known as inforensic) of IT security incidents has become essential for preserving evidence. Following simulated attacks, you will learn how to collect and preserve evidence, analyze it and improve IS security after the intrusion.


INTER
IN-HOUSE
CUSTOM

Practical course in person or remote class
Disponible en anglais, à la demande

Ref. AFB
  3d - 21h00
2470 CHF E.T.




Post-mortem analysis (also known as inforensic) of IT security incidents has become essential for preserving evidence. Following simulated attacks, you will learn how to collect and preserve evidence, analyze it and improve IS security after the intrusion.


Teaching objectives
At the end of the training, the participant will be able to:
Master the right reflexes in the event of machine intrusion
Collect and preserve the integrity of electronic evidence
Analyze intrusion a posteriori

Intended audience
Systems and network engineer/administrator.

Prerequisites
Good knowledge of IT security and networks/systems. Must have taken the course "Collecting and analyzing logs, optimizing your IS security".

Course schedule

1
How do you manage an incident?

  • Signs of successful IS intrusion.
  • What have the hackers achieved? How far did they get?
  • How do you react to a successful intrusion?
  • Which servers are affected?
  • Find the entry point and fill it.
  • The Unix/Windows toolbox for evidence retrieval.
  • Clean-up and return compromised servers to production.

2
Analyze incidents for better protection: Forensic analysis

  • Computer forensics: types of computer crime, role of the computer investigator.
  • Modern cybercrime.
  • Digital proof.

3
Forensic analysis of a Windows operating system

  • Acquisition, analysis and response.
  • Understanding start-up processes.
  • Collect volatile and non-volatile data.
  • How the password system and Windows registry work.
  • Analysis of data contained in RAM and Windows files.
  • Cache analysis, cookie and browsing history, event history.
Hands-on work
User injection. Break password. Collect, analyze RAM data. Reference and hash all files. Explore browser and registry data.


Customer reviews
4,8 / 5
Customer reviews are based on end-of-course evaluations. The score is calculated from all evaluations within the past year. Only reviews with a textual comment are displayed.
RENAUD L.
28/01/26
5 / 5

COntenu adapté et formateur très compétent
JEAN-FRANÇOIS G.
28/01/26
5 / 5

très intéressant, merci au formateur pour cette plongée dans le forensic
DJELLAL H.
15/12/25
5 / 5

Très satisfait



Dates and locations

Dernières places
Date garantie en présentiel ou à distance
Session garantie
From 18 to 20 March 2026
FR
Remote class
Registration
From 8 to 10 June 2026
FR
Remote class
Registration
From 16 to 18 September 2026
FR
Remote class
Registration
From 12 to 14 October 2026
FR
Remote class
Registration
From 23 to 25 November 2026
FR
Remote class
Registration

REMOTE CLASS
2026 : 18 Mar., 8 June, 16 Sep., 12 Oct., 23 Nov.