
Grzegorz Tworek – Mastering Windows Forensics
English | Tutorial | Size: 1.17 GB
Learn to uncover evidence of security incidents in Windows systems. Whether you’re looking to learn new skills, master new tools, or fine-tune your threat detection capabilities, this course can help.
🎯 Get strategies for understanding attack vectors, improving forensic investigations, and crafting robust Windows endpoint defenses.
Course Outline 📋
🔎 Windows Search Artifacts
Uncovering search histories and patterns.
💾 NTFS Structures
Navigating the NT File System for Forensic Insights.
🖥️ Disk Imaging
Techniques for creating accurate replicas of storage devices.
🧠 Memory Dumps
Capturing RAM contents for forensic evidence.
⚡ Windows Prefetch
Understanding application use and execution.
🔌 Hardware-Related Artifacts
Identifying physical device use and connections.
🗑️ The Recycle Bin
Recovering deleted files and understanding deletion patterns.
📊 Log Analysis
Leveraging Windows logs for forensic evidence.
📝 Windows Logging
Deep dive into logging mechanisms.
🌐 Internet Browser Artifacts
Tracking online activities and histories.
📈 SRUM Database
Analyzing system resource usage for forensic clues.
🚨 Identifying Suspicious Files and Settings
Techniques for detecting malware and intrusions.
🏢 Active Directory and its Database
Exploring user and device behaviors in networked environments.
🗂️ Windows Registry Analysis
Deciphering registry entries for user actions and system configurations.
👤 User Profile Analysis
Investigating user profiles for personalization and usage patterns.
🛡️ Managing Digital Forensics and Incident Response
Best practices for efficient and effective analysis.
💻 Online and Offline Analysis
Approaches for analyzing systems in different states.
📚 Case Studies and Real-world Scenarios
Applying knowledge to practical situations.
DOWNLOAD:
TURBOBIT:
trbt.cc/9ttibuyh9or6/Grzegorz_Tworek_-_Mastering_Windows_Forensics_2025.8_hide01.ir.rar.html