https://i116.fastpic.org/big/2022/0303/49/3b080d7f1369a97b90bc7c6a65543a49.jpeg

Chad Tilbury (et al.) | Duration: 36h 00m | Video: H264 1280x720 | Audio: AAC 32 kHz mono | 7,17 GB | Language: English
FOR500 builds in-depth and comprehensive digital forensics knowledge of Microsoft Windows operating systems by analyzing and authenticating forensic data as well as track detailed user activity and organize findings. It teaches students to apply digital forensic methodologies to a variety of case types and situations, allowing them to apply in the real world the right methodology to achieve the best outcome.
All organizations must prepare for cybercrime occurring on computer systems and within corporate networks. Demand has never been greater for analysts who can investigate crimes such as fraud, insider threats, industrial espionage, employee misuse, and computer intrusions. Government agencies increasingly require trained media exploitation specialists to recover vital intelligence from Windows systems, as well as law enforcement investigators to get to the root of a crime. To help solve these cases, SANS is training a new cadre of the world's best digital forensic professionals, incident responders, and media exploitation experts capable of piecing together what happened on computer systems second by second.

FOR500: Windows Forensic Analysis focuses on building in-depth digital forensics knowledge of Microsoft Windows operating systems. You can't protect what you don't know about, and understanding forensic capabilities and available artifacts is a core component of information security. You will learn how to recover, analyze, and authenticate forensic data on Windows systems, track individual user activity on your network, and organize findings for use in incident response, internal investigations, intellectual property theft inquiries, and civil or criminal litigation. You'll be able to validate security tools, enhance vulnerability assessments, identify insider threats, track hackers, and improve security policies. Whether you know it or not, Windows is silently recording an unbelievable amount of data about you and your users. FOR500 teaches you how to mine this mountain of data and use it to your advantage.
Proper analysis requires real data for students to examine. This continually updated course trains digital forensic analysts through a series of new hands-on laboratory exercises that incorporate evidence found on the latest technologies, including Microsoft Windows 7, Windows 8/8.1, Windows 10, Office and Microsoft 365, Google Workspace (G Suite), Cloud Storage, SharePoint, Exchange, and Outlook. Students will leave the course armed with the latest tools and techniques and prepared to investigate even the most complicated systems they might encounter. Nothing is left out - attendees learn to analyze everything from legacy Windows 7 systems to just-discovered Windows 10 artifacts.
You Will Be Able To
* Perform proper Windows forensic analysis by applying key techniques focusing on Windows 7, Windows 8/8.1, and Windows10
* Use state-of-the-art forensic tools and analysis methods to detail nearly every action a suspect accomplished on a Windows system, including who placed an artifact on the system and how, program execution, file/folder opening, geolocation, browser history, profile USB device usage, cloud storage usage, and more
* Uncover the exact time that a specific user last executed a program through Registry and Windows artifact analysis, and understand how this information can be used to prove intent in cases such as intellectual property theft, hacker-breached systems, and traditional crimes
* Determine the number of times files have been opened by a suspect through browser forensics, shortcut file analysis (LNK), email analysis, and Windows Registry parsing
* Audit cloud storage usage, including detailed user activity, identifying deleted files and even documenting files available only in the cloud
* Identify keywords searched by a specific user on a Windows system to pinpoint the data and information that the suspect was interested in finding, and accomplish detailed damage assessments
* Use Windows Shellbag analysis tools to articulate every folder and directory a user or attacker interacted with while accessing local, removable, and network drives
* Determine each time a unique and specific USB device was attached to the Windows system, the files and folders accessed on it, and what user plugged it in by parsing Windows artifacts such as Registry hives and Event Log files
* Learn Event Log analysis techniques and use them to determine when and how users logged into a Windows system, whether via a remote session, at the keyboard, or simply by unlocking a screensaver
* Determine where a crime was committed using Registry data and pinpoint the geolocation of a system by examining connected networks and wireless access points
* Use browser forensic tools to perform detailed web browser analysis, parse raw SQLite and ESE databases, and leverage session recovery artifacts to identify web activity, even if privacy cleaners and in-private browsing software are used
* Specifically determine how individuals used a system, who they communicated with, and files that were downloaded, modified, and deleted
Homepage

Код:
https://www.sans.org/cyber-security-courses/windows-forensic-analysis/

download скачать

Код:
https://nitroflare.com/view/D1F3BC1AC4FE001/1d9rm.SANS..FOR500..Windows.Forensic.Analysis.part1.rar
https://nitroflare.com/view/AE7042D5F1DD215/1d9rm.SANS..FOR500..Windows.Forensic.Analysis.part2.rar
https://nitroflare.com/view/40CEB2085836D3B/1d9rm.SANS..FOR500..Windows.Forensic.Analysis.part3.rar
https://nitroflare.com/view/7F45C5B1C8F9F7A/1d9rm.SANS..FOR500..Windows.Forensic.Analysis.part4.rar
https://nitroflare.com/view/F65569F3D1DE84F/1d9rm.SANS..FOR500..Windows.Forensic.Analysis.part5.rar
https://nitroflare.com/view/D52E1EFA11CC994/1d9rm.SANS..FOR500..Windows.Forensic.Analysis.part6.rar
https://nitroflare.com/view/CA9FCC6EC15C6A4/1d9rm.SANS..FOR500..Windows.Forensic.Analysis.part7.rar
https://nitroflare.com/view/4F2CECDFD9A1B71/1d9rm.SANS..FOR500..Windows.Forensic.Analysis.part8.rar
Код:
https://rapidgator.net/file/1e3936402703504174d6d2bb20f7b4a8/1d9rm.SANS..FOR500..Windows.Forensic.Analysis.part1.rar
https://rapidgator.net/file/2a36a9877b3910c82c3f1676e76ed5a3/1d9rm.SANS..FOR500..Windows.Forensic.Analysis.part2.rar
https://rapidgator.net/file/a5741c2bcd44f682166bc756271e8729/1d9rm.SANS..FOR500..Windows.Forensic.Analysis.part3.rar
https://rapidgator.net/file/0994fc87fbf65e5606149afa050ac6ea/1d9rm.SANS..FOR500..Windows.Forensic.Analysis.part4.rar
https://rapidgator.net/file/49d3bae7d80b8d6833f5e483bdad3bcc/1d9rm.SANS..FOR500..Windows.Forensic.Analysis.part5.rar
https://rapidgator.net/file/1af7caaf9c945e268d67db5816f4ae46/1d9rm.SANS..FOR500..Windows.Forensic.Analysis.part6.rar
https://rapidgator.net/file/b7778d5d1820fe7e1754f570f7aa9f77/1d9rm.SANS..FOR500..Windows.Forensic.Analysis.part7.rar
https://rapidgator.net/file/1664fb06c4bfa189b284b6cf1fcc7b85/1d9rm.SANS..FOR500..Windows.Forensic.Analysis.part8.rar