Products
-
Investigating Windows System Registry Artifacts
Explore key Windows system registry artifacts using hands‑on virtual labs. Learn how to extract SYSTEM hive files from live systems or disk images, analyze AppCompatCache, Autoruns, network and user data, and uncover critical forensic evidence.
Digital Forensics & Incident Response
$50
-
Investigating Windows User Registry Artifacts
Dive into Windows user registry forensics. Extract and analyze NTUSER.DAT and USRCLASS.DAT to trace application usage, browsing, search queries, and more, via hands-on labs that help you build accurate user activity timelines.
Digital Forensics & Incident Response
$50
-
Investigating Windows Shellbags
Explore Windows Shellbag artifacts to reconstruct folder view history. Learn to parse BagMRU and Bags registry keys, analyze timestamp metadata, and infer accessed directories, even deleted ones, through practical forensic labs.
Digital Forensics & Incident Response
$50
-
Investigating USB Thumb Drives
Analyze Windows USB forensic artifacts in hands-on labs. Learn to identify device IDs, connection timestamps, drive letters, and registry entries (e.g. MountPoints and SetupAPI logs). Ideal for DFIR analysts and USB investigations.
Digital Forensics & Incident Response
$50
-
Volume Shadow Copies (VSC)
Learn how Windows Volume Shadow Copies (VSS) work and how to use them in forensic investigations. Gain skills to detect, mount, and analyze shadow snapshots to recover previous file versions. Hands-on labs ideal for DFIR analysts.
Digital Forensics & Incident Response
$50
-
Investigating Windows Scheduled Tasks
Learn how to parse Windows Scheduled Tasks artifacts using hands-on virtual labs. Understand task formats, registry and XML artifacts, and how to uncover forensic evidence from scheduled jobs. Free foundational training for DFIR investigators.
Digital Forensics & Incident Response
Free