Surviving Digital Forensics: Windows Explorer
Surviving Digital Forensics: Windows Explorer
Welcome to the Surviving Digital Forensics series. Oftentimes you will be asked to find information on a target system that shows if a user accessed certain files, the last time they did and/ or how often they did. Being able to put a picture together that answers these questions can be critical and make or break the case. In this course you will learn one method that can be used to answer these questions. Of course we will be using all low cost or no cost computer forensic tools. The course is focused on just what you need and you will be up and running in under an hour.
As with previous SDF classes you will learn by doing. The class begins with a brief overview of the method we will be using and then it is all hands on. There are three practicals in which you work with our prepared files in applying the technique as well as questions to answer about each scenario.
Learn how to prove file use & knowledge with evidence from Windows Explorer
Url: View Details
What you will learn
- Overview of target files used for IE History
- Learn about the target files in IE History you can use to extract file access data
- Learn how to organize these files to use with a freely available forensic tool
Rating: 4.25
Level: All Levels
Duration: 1 hour
Instructor: Michael Leclair
Courses By: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
About US
The display of third-party trademarks and trade names on this site does not necessarily indicate any affiliation or endorsement of coursescompany.com.
View Sitemap