COURSE OUTLINE

Session 9

Windows files analysis

Windows event log files.
Prefetch files. Windows Recycle Bin, Shortcuts, VSS. Tools for analysis

Session 5

Remediation

Basic concepts of remediation process. Response plan. Containment and eradication actions.

Session 6

Digital Forensic fundamentals

Terms, principles and definitions of digital forensic. Live and postmortem approaches.

Session 1

Incident Response Foundations

Basic terms and definitions of IR. Nature of cyber attacks. Used cases.

Session 2

Incident Response Management

Lifecycle of cyber incident. IR process.Preparation to IR.

Session 4

Data Collection

Evidence acquisition. Disk’s imaging. Dump of memory. Network traffic capturing.

Session 3

Incident Detection and Initial Response

Monitoring and initial analysis of suspicious alerts. Verification and assessment of incidents. Basic indicators of compromise.

Session 7

Live Analysis

Tools to collect data. Order of volatility.
Remote approach for evidence acquisition.

Session 8

Registry Analysis

Structure of MS Windows registry. Tools for analysis.

Session 10

Filesystem Analysis

Structure of different types of filesystems.
NTFS, ext4, APFS

Session 11

Timeline

Timeline introduction. TSK.
Super timeline - Plaso framework.

Session 12

Data Recovery

Approach to data recovery. Data carving.

Session 13

Browser and Email Investigation

History files, Cache, Cookies in various browsers. Outlook OST and PST files..

Session 14

Memory Forensics

Memory structure. Basic conceptions. Volatility and Recall frameworks.

Session 15

Network Forensics

Application’s log exploring, using Wireshark.
Bro Framework.