OverviewDid you know Windows is actually silently recording an unbelievable amount of data about you and your users? Windows Forensic Analysis (FOR500) teaches you how to mine this mountain of data. Focused on building in-depth digital forensics knowledge of Microsoft Windows operating systems, this course will help you understand that forensic capabilities and artefacts is a core component of information security, covering areas such as how to:
You will be able to use your new skills to validate security tools, enhance vulnerability assessments, identify insider threats, track hackers, and improve security policies.
|
Learning OutcomeThe artefacts and tool-agnostic techniques you will learn will lead to the successful analysis of any cyber incident and crime involving a Windows Operating System. This includes:
|
Who should Attend?
This course is perfect for you if you are interested in in-depth and current Microsoft Windows Operating System forensics and analysis for any incident that occurs. If you have not updated your Windows forensic analysis skills in the past three years or more, this course is essential.
|
Eligibility CriteriaThere are no prerequisite courses required to take this course. Please note that this is an analysis-focused course; FOR500 does not cover the basics of evidentiary handling, the "chain of custody," or introductory drive acquisition. Our authors update FOR500 aggressively to stay current with the latest artefacts and techniques discovered.
|
This course is endorsed under Critical Infocomm Technology Resource Programme Plus (CITREP+) Programme. To find out more about CITREP+ Funding, please refer to Programme Support under CITREP+ page |
Information is accurate as of 30 December 2019