Course Summary
This course prepares candidates for hands-on digital forensics and threat hunting roles. In this course, participants will learn how to process, analyze, and interpret enterprise host-based forensic artifacts, as well as how to detect threats and malicious activity. Key topics include:
Windows host file system artifacts
Windows system triage analysis
Collecting volatile evidence from Windows systems
Windows system and activity event analysis
Identifying and detecting enterprise threats
Recognizing malicious threat actor activity within an enterprise environment
Analyzing Lateral Movement Artifacts
You will learn how to identify and analyze events related to malicious lateral movement within a network.
Examining Evidence of Execution
You will learn how to detect and analyze evidence of program, script, or file execution from Windows host artifacts.
Analyzing Volatile Evidence
You will learn to examine memory-resident artifacts to identify both normal and malicious activities.
Reviewing Windows Event Log Data
You will learn how to interpret Windows event log data to identify and analyze both legitimate and malicious actions.
Examining Windows File System Artifacts
You will learn how to analyze Windows host artifacts to distinguish between normal system operations and suspicious activities.
Identifying Evasion Techniques
You will learn how to identify the use of tools and techniques that attackers may use to remove or conceal traces of malicious activity.
Investigating Credential Theft
You will learn how to recognize and analyze artifacts associated with the theft of credentials, including the methods used to steal and use them.
Investigating Persistence Mechanisms
You will learn how to identify and analyze persistence mechanisms, such as configuration changes or scripts, that allow malicious activity to survive system reboots or continue unnoticed.
Temporal Event Analysis
You will learn how to review and analyze event data based on timing to differentiate between routine activity and suspicious or malicious events.
Other Popular Courses
CompTIA: SecurityX
- Duration: 5 Days
- Language: English
- Level: Advanced
- Exam: CAS-005
Executive Cyber Risk Certification (ECRC)
- Duration: 2 Days
- Language: English
- Level: Advanced
- Exam: ECRC
Mastering Communication & Presentation Te...
- Duration: 5 Days
- Language: Danish
- Level: Intermediate
- Exam: MCPT