Publication date : 05/13/2024

Course : Forensics Windows

Practical course - 5d - 35h00 - Ref. FOH
Price : 3660 CHF E.T.

Forensics Windows




After a computer attack, forensic investigation is used to collect and analyze evidence for legal proceedings. The main objective is therefore to recover and analyze data proving a digital crime.


INTER
IN-HOUSE
CUSTOM

Practical course in person or remote class
Disponible en anglais, à la demande

Ref. FOH
  5d - 35h00
3660 CHF E.T.




After a computer attack, forensic investigation is used to collect and analyze evidence for legal proceedings. The main objective is therefore to recover and analyze data proving a digital crime.


Teaching objectives
At the end of the training, the participant will be able to:
Managing a digital investigation on a Windows computer
Analyze intrusion a posteriori
Collect and preserve the integrity of electronic evidence

Intended audience
People wishing to get started in computer forensics. Windows system administrators. Computer law experts.

Prerequisites
A solid grounding in information systems security.

Practical details
Hands-on work
Training alternates theory and practice. Everything we learn is put into practice.

Course schedule

1
Inforensics presentation

  • Scope of investigation.
  • Toolkit, methodology "First Responder" and Post-mortem analysis.
  • Hard disks, introduction to file systems and time stamps.
  • Data acquisition (persistent and volatile) and encrypted media management.
  • Search for deleted data.
  • Backups, Volume Shadow Copies and flash storage hazards.
  • Windows registers and register structures.
  • Analysis of logs, events / antivirus / other software.

2
Investigation scenario

  • Download/access confidential content.
  • Program execution, file and folder manipulation traces.
  • Deleted files, unallocated space and carving.
  • Geolocation and photographs (Exifs data).
  • SMTP logs: server-side acquisition, mail client analysis.
  • WiFi access points and USB devices.
  • HTML5, emails and users abused by malware.
  • Exfiltration of information.

3
Interaction on the Internet

  • Office 365.
  • Sharepoint.
  • Traces on Windows ADs.
  • Presentation of the main artifacts.
  • Basics of RAM analysis.
  • Use of Internet browsers.
  • Chrome / IE / Edge / Firefox.

4
Linux forensics

  • The basics of inforensics on a Linux workstation.
  • The basics of inforensics on a Linux server: Web server logs & file system correlations.
  • Creation and analysis of a file system timeline.

5
Overview

  • Creation and analysis of a timeline enriched with artifacts.
  • Example of tools for querying large volumes of data.


Dates and locations

Dernières places
Date garantie en présentiel ou à distance
Session garantie
From 16 to 20 March 2026
FR
Remote class
Registration
From 15 to 19 June 2026
FR
Remote class
Registration
From 28 September to 2 October 2026
FR
Remote class
Registration
From 7 to 11 December 2026
FR
Remote class
Registration

REMOTE CLASS
2026 : 16 Mar., 15 June, 28 Sep., 7 Dec.