Course Curriculum
-
01
Windows Event Viewer Forensics
-
Windows Event Viewer Forensics
-
-
02
Understanding Windows Event Logs
-
Navigating Windows Event Viewer
-
Searching For Events
-
Types of Events
-
-
03
Enabling Logs & Changing Log Settings
-
Enabling Logs & Changing Log Settings
-
Enable Auditing Through Group Policy
-
Enable Logging through Event Viewer
-
Event Log Settings
-
-
04
Extracting and Importing Event Logs
-
Extracting and Importing Event Logs
-
Extracting an Event Log from a Disk Image
-
Importing an Event Log File
-
Check Your Knowledge
-
-
05
Event Logs Artifacts
-
Event Logs Artifacts
-
System Log
-
Security Log #1
-
Security Log #2
-
Security Logs #3
-
Security Logs #4
-
Security Logs #5
-
Security Logs #6
-
Security Logs #7
-
Check your Knowledge:
-
Application Log
-
Applications & Services Log #1
-
Applications & Services Log #2
-
Other Tools: Event Log Parser
-
Investigation Lab
-
Investigation Lab - Solutions
-
-
06
Conclusion and Resources
-
Conclusion
-
References
-
6 CPE Credits
After completing this course, you will earn:
Learning Outcomes
After completing this course, you will learn the following.
-
The ability to view, analyze, extract, and open Windows event logs
-
Understanding of applicable forensic applications of event log artifacts
-
Knowledge of the issues associated with Windows event logs
Technical Requirements
For the hands-on labs in this course
-
Windows machine (recommended Windows 10)
-
Internet connection
-
FTK Imager, if working with a forensic disk image
What is next at Cyber 5W?
Add your email to the mailing list to get the latest updates