shape-876@2x

סייבר ואבטחת מידע

Windows Forensic Host

מספר הקורס 71585

40 סה"כ שעות אקדמאיות
5 מפגשים
* מספר המפגשים והשעות למפגש עשויים להשתנות בין קורס לקורס
calendar-1.svg

המועדים הקרובים

קורס לקבוצות

הקורס נפתח במתכונת של קבוצה בלבד, בהתאמה אישית לארגונים.
לפרטים נוספים: Muzman@johnbryce.co.il

ספרו לי עוד

Overview

Windows Forensics is an essential skill in the cybersecurity world. This course covers a broad spectrum of aspects of the forensic investigation process performed on Windows OS. Participants will learn how different computer components work and how to investigate after a cyber-incident. The training will focus on developing hands-on capabilities of forensics teams or individual practitioners in these areas:

  • Searching the hard drive for evidence
  • Processing hidden files that are invisible or inaccessible containing past-usage information
  • Performing a forensic analysis on a computer to reveal usage details, recover data, and accomplish a full inspection after the machine has been defragged or formatted

The course helps prepare for the certification exams CHFI (EC|Council) and GCIH (SANS).

hat.png

On Completion, Delegates will be able to

Access concealed files on the system and extracting relevant information

Master the steps of incident response

Analyze relevant case studies

kahal.png

Who Should Attend

This course targets participants with basic knowledge in IT or networking who wish to have a deeper understanding of cyber investigations and the forensic process: Law enforcement officers & intelligence corps Incident responders Computer investigators IT/network administrators

structure.png

תכנית הלימודים

Full syllabus
PDF להורדה

Module 1: Computer Hardware

The first module will cover different components of computer hardware. Students will learn the main components of Storage-Disks, the structure of the Windows OS, and finally, the students will install their first virtual forensics stations.

  • Drives and Disks
    • The Anatomy of a Drive
    • Data Sizes
    • Volumes & Partitions
    • Disk Partitioning and the Disk Management Tool
    • Solid State Drive (SSD) Features
  • Understanding Windows OS structure
    • The filesystem
    • NTFS
    • The EFS Encryption
    • Windows Directory Structure
  • Virtualizing a Forensics Workstation
    • Setting up a Virtual Machine
    • Installing and Configuring the VM
    • Preparing the Environment

Module 2: Forensic Fundamentals

This module will expose students to the internal components of the Windows OS. Students will learn about tools that will help them with the Forensics investigation process.

  • Understanding Hashes and Encodings
    • Hash as a Digital Signature
    • The Use of Hash for Forensics
    • Base Encodings
  • Windows Artifacts
    • Startup Files
    • Jump List
    • Thumbnail Cache
    • Shadow Copy
    • Prefetch and Temp Directories
    • RecentApps
    • Registry Hives
  • Windows Passwords – Bypassing Windows Protection
    • Encryptions in the Windows OS
    • Cracking Windows Passwords
    • Cracking RAR/ZIP Passwords
  • Data and Files structure
    • Hexadecimal Editing Tools
    • File Structure
    • Embedded Metadata
    • Working with Clusters

Module 3: Collecting Evidence 

During this module, students will master techniques for collecting evidence, accessing, and retrieving volatile and non-volatile information. Students will learn techniques for collecting evidence, accessing, and retrieving volatile and non-volatile information.

  • Forensic Data Carving
    • Using HxD for Forensics Carving
    • Automatic File Carving Tools
  • Collecting Information
    • Indenting Evidence of Program Execution
    • Detecting Hidden Files using ADS
    • Self-Extracting Archives (SFX)
    • Collecting Network Information
    • Sysinternals-Suite Forensic Tools
    • Extracting Credentials using NirSoft
  • Drive Data Acquisition
    • Introduction to FTK-Imager
    • Capturing Volatile-Memory

Module 4: Analyzing Forensic Findings

In this module, students will understand how to uncover hidden information, detect tampered files, work with memory, and analyze the Ram.

  • Analyzing captured images
    • Features of FTK
    • MFT Dump
    • Analyzing Prefetch Files
    • Reconstructing Explorer with ShellBags
  • Working with Volatile-Memory
    • Extracting Data from RAM
    • Identifying Network Connections
    • Dumping Processes from Memory
  • Registry analysis
    • Using AccessData Registry Viewer to analyze Registry dumps
    • Finding user Information using Ntuser.dat and usrclass.dat
    • Using CLI to Access the Registry
    • Extracting Data from Registry
    • Forensics Findings in the Registry
  • Anti-Forensics Techniques
    • Wiping Drives
    • Advanced Stenographic Methods
    • File Obfuscation Techniques
    • Data Forgery
    • Drive and File Encryption
    • Artifact Removing
Prerequisites
  • Basic Linux Knowledge
סימולטור - Cyberium Arena

The courses at John Bryce Training allow you to gain experience with unique simulators and hands-on practice labs that include a variety of scenarios. Students are given the opportunity to put in practice what they have learned in order to retain all the relevant skills and information they were given throughout the course, this way upgrading their knowledge and expertise.

The simulator that is used in the hands on practice labs is The Cyberium system. This is an advanced cyber scenario simulator which has been developed by cyber experts who have been constantly involved in cyber training and in giving knowledge gaps solutions in the field of cyber. The simulator includes two main types of scenarios – educational and realistic.

Each educational scenario is focused on a different aspect of the course and simulates a specific aspect of the training topics. Each issue or topic taught in the course has a point exercise that allows the student to focus on it and deeply learn it.

The realistic scenarios simulate possible or past incidents related to Information Security. This includes everything from topics such as the Regulation of Cyber Systems to Attacks by Terrorist Hacker Organizations. These scenarios are broader than the educational exercises and require more of a systemic, strategic and comprehensive vision.

After each scenario, the system automatically generates detailed reports that serve as immediate feedback that allows the student and lecturer to measure the abilities, strengths, and weaknesses of the participant.

 

Schedule Appointment

Fill out the form below, and we will be in touch shortly.

לא הצלחנו לאתר את הטופס.

בודק...