Apr 19, 2024  
2019-2020 Course Catalog 
    
2019-2020 Course Catalog [ARCHIVED CATALOG]

Add to Portfolio (opens a new window)

CVF 1081 - Advanced Windows Forensics

Credits: 3
Hours/Week: Lecture 2 Lab 2
Course Description: This course provides an in-depth examination of the forensic evidence left on Windows-based file systems using a variety of methods and tools to investigate any event for the workplace. It covers Windows methods that ensure maximum evidence capture without poisoning key evidence residing in disk space and memory. This course aligns with the objectives of the EnCase Certified Examiner (ENCE) certification.
MnTC Goals
None

Prerequisite(s): CVF 1065  with a grade of C or higher or instructor consent.
Corequisite(s): None
Recommendation: None

Major Content
  1. Guidance Software EnCase
    1. EnCase Overview
    2. EnCase Interface
    3. Basic Data Analysis
    4. Creating a Case
    5. Narrowing/Filtering data
    6. Reporting
    7. Keyword/Pattern Searching
  2. Cryptography Understand the fundamentals of encryption Understand decryption technologies Identify and recover encrypted data Perform decryption on various files
  3. Email Analysis Microsoft Outlook Microsoft Mail Web-based email Email headers
  4. Examining Windows Artifacts (XP, Vista, 7) Directory Structure Recycle Bin Thumbs.db Shortcut/Link (LNK) Files Prefetch Restore Points File metadata Volume Shadow Copy Log files
  5. Live Analysis & Incident Response Understand requirements for live response Perform analysis on a live system Employ automated toolkits to collect information from Windows-based systems Understand and implement Incident Response technologies Perform imaging and analysis of Windows-based systems
  6. Memory Analysis Issues in collecting Windows memory Image and analyze Windows memory Identify registry data in memory Identify process information in memory Identify passwords in memory
  7. Web Browser Analysis (Internet Explorer, Firefox, Chrome) Internet history Cookies Cached files Recovering deleted history Private browsing
  8. Windows Registry Analysis Identify the structure of the Windows registry identify and understand Windows registry artifacts Locate and examine deleted Windows registry data Perform testing of applications in the Windows registry Perform analysis of the Windows registry

Learning Outcomes
At the end of this course students will be able to:

  1. employ automated toolkits to collect information from Windows-based systems
  2. perform analysis of the Windows registry
  3. identify and recover encrypted and hidden data
  4. implement Incident Response Technologies
  5. perform imaging and analysis of Windows-based systems
  6. perform analysis on a live system

Competency 1 (1-6)
None
Competency 2 (7-10)
None


Courses and Registration



Add to Portfolio (opens a new window)