COURSE OUTLINE
Session 9
Windows files analysis
Windows event log files.
Prefetch files. Windows Recycle Bin, Shortcuts, VSS. Tools for analysis
Session 5
Remediation
Basic concepts of remediation process. Response plan. Containment and eradication actions.
Session 6
Digital Forensic fundamentals
Terms, principles and definitions of digital forensic. Live and postmortem approaches.
Session 1
Incident Response Foundations
Basic terms and definitions of IR. Nature of cyber attacks. Used cases.
Session 2
Incident Response Management
Lifecycle of cyber incident. IR process.Preparation to IR.
Session 4
Data Collection
Evidence acquisition. Disk’s imaging. Dump of memory. Network traffic capturing.
Session 3
Incident Detection and Initial Response
Monitoring and initial analysis of suspicious alerts. Verification and assessment of incidents. Basic indicators of compromise.
Session 7
Live Analysis
Tools to collect data. Order of volatility.
Remote approach for evidence acquisition.
Session 8
Registry Analysis
Structure of MS Windows registry. Tools for analysis.
Session 10
Filesystem Analysis
Structure of different types of filesystems.
NTFS, ext4, APFS
Session 11
Timeline
Timeline introduction. TSK.
Super timeline - Plaso framework.
Session 12
Data Recovery
Approach to data recovery. Data carving.
Session 13
Browser and Email Investigation
History files, Cache, Cookies in various browsers. Outlook OST and PST files..
Session 14
Memory Forensics
Memory structure. Basic conceptions. Volatility and Recall frameworks.
Session 15
Network Forensics
Application’s log exploring, using Wireshark.
Bro Framework.