Course Curriculum
-
01
Overview
-
Introduction
-
Tool Requirements
FREE PREVIEW -
Case Study Forensic Image
-
-
02
Guided Questions
-
Initial Investigation
-
Prefetch Files
-
Volume Shadow Copies
-
Jump Lists
-
Conclusion
-
-
03
Solutions
-
Case Study Solution
-
Solution Report
-
Finally, before you go...
-
Learning Outcomes
During this case you will learn how to investigate a system and locate evidence when the user encrypted some of their interesting files.
-
Learning how to utilize multiple artifacts together in an investigation.
-
Learning how to investigate software execution and file access history artifacts.
-
Learn how to find user activity related to files of interest, even though they are encrypted.
What is next at Cyber 5W?
Add your email to the mailing list to get the latest updates.