Course Curriculum
-
-
Introduction
-
Tool Requirements
FREE PREVIEW -
Case Study Forensic Image
-
-
-
Initial Investigation
-
Prefetch Files
-
Volume Shadow Copies
-
Jump Lists
-
Conclusion
-
-
-
Case Study Solution
-
Solution Report
-
Finally, before you go...
-
About this course
- $50.00
- 11 lessons
- 0 hours of video content
Learning Outcomes
During this case you will learn how to investigate a system and locate evidence when the user encrypted some of their interesting files.
-
Learning how to utilize multiple artifacts together in an investigation.
-
Learning how to investigate software execution and file access history artifacts.
-
Learn how to find user activity related to files of interest, even though they are encrypted.
What is next at Cyber 5W?
Add your email to the mailing list to get the latest updates.