Windows Forensics

Windows Forensics

Windows Forensics

Navigate, Analyse & Protect Your Windows Systems

In Partnership With:
Ngee Ann Pol

In Partnership With: 

Ngee Ann Polytechnic Logo

Supporting Partner:

View Course Brochure


View Brochure

Course Fee

Full Course Fees

SG Citizen (aged 21-39) or PR

SG Citizen (aged 40 & above)

Full Fees

$19,500

$19,500

$19,500

SkillsFuture Funding

-

$13,650 (70% Subsidy)

$17,550 (90% Subsidy)

Total Nett Fee

$19,500

$5,850

$1,950

GST (9%)

$1,755

$526.5

$526.5

Total Fee Payable

$21,255

$6,376.50

$2,476.50

Additional Funding: SkillsFuture Credits (up to $500), UTAP ($200-$500) & PSEA can be used to pay for course fees after subsidy

Programme Fees & Funding

Introduction To Cybersecurity SkillsFuture Funding Table

Learning Outcomes: 

    Participants will:

    • Gain expertise in handling digital data within Windows environments, from file and disk analysis to metadata examination, employing tools like Hex Editors and FTK.
    • Learn to identify and manipulate hidden files and understand the intricacies of data hiding and extraction techniques within the Windows operating system.
    • Develop the ability to collect and analyze digital artifacts, focusing on registry analysis and evidence extraction methods to enhance digital investigations.
    • Acquire advanced skills in memory, event, network, and malware analysis to dissect complex cyber threats and vulnerabilities.
    • Understand the critical aspects of web application security, identifying common vulnerabilities and employing strategies to secure data transactions and maintain overall application integrity.

    Course Syllabus:

    Chapter 01
    Digital Data

    Files and Disks

    • Encoding
    • Number Systems
    • Digital Sizes
    • Solid State Drive (SSD) Features

    Hex Editor

    • Working with Offsets
    • Viewing Files
    • Viewing Disks

    Automatic Carving

    • Carving Methods
    • Automatic Carvers
    • Windows System Files

    Metadata

    • Viewing Metadata
    • Modified Accessed Created
    • Editing Exif Data

    Steganography

    • Identify Hidden Files
    • Extracting Hidden Files
    • Creating Hidden Files

    Hard Disk Analysis

    • System Files
    • MFT Analysis
    • Working with FTK

    Chapter 02
    File Forensics
    Question text goes here
    • Become familiar with different attack scenarios

    Artefacts

    • Artifact Directories
    • Browsers
    • Shadow Copies

    Registry Analysis

    • Extracting Data
    • NTUSER.DAT Analysis
    • General Search
    • Registry Viewers
    Chapter 03
    Collecting Evidence
    Question text goes here
    • Become familiar with different attack scenarios

    Memory Analysis

    • Creating an Image
    • Working with Volatility
    • Carving Data from RAM

    Events Analysis

    • Event Viewers
    • Setting Audit Policy
    • Custom Search

    Network Analysis

    • Service Protocol Analysis
    • Identifying Darknet Connections

    Malware Analysis

    • Basic Static Analysis
    • Basic Dynamic Analysis
    Chapter 04
    Analysis
    Question text goes here
    • Become familiar with different attack scenarios
    Chapter 05
    Question text goes here
    • Become familiar with different attack scenarios

    Training Schedule:

    Tailored To Client

    Tailored To Client
    Question text goes here

    Training Methodology:

    Apprenticeship-based Training

    • Experience hands-on learning with our demonstration method on a virtual/host machine, ensuring immersive understanding.
    • Our trainers prioritise showing over telling, explaining intricacies without relying on slides, offering direct engagement.
    • Bridge your knowledge gap by connecting theoretical concepts to practical cybersecurity applications, enhancing career readiness.

    Practice Labs

    • Engage in repeated practice sessions to solidify and reinforce your understanding.
    • Delve deeper with practice questions, encouraging students to explore interconnected topics and enhance comprehension.
    • Stimulate critical thinking through challenge questions, prompting students to seek solutions and broaden their problem-solving abilities.

    Assessment and Project

    • Equip yourself with the expertise and tools essential for navigating corporate networks safely.
    • Gain a comprehensive understanding of cyber-attacks to fortify your digital environment effectively.
    • Broaden your horizon by familiarising yourself with diverse cyber-attack scenarios and their implications.

    Question text goes here
    • Become familiar with different attack scenarios

    FAQs:

    Question text goes here
    • Become familiar with different attack scenarios
    Quick Info
    Programme Fee
    Custom Pricing
    Duration
    5 days (8 hours/day)
    Schedule
    Tailored To Client
    Teacher-to-Student Ratio
    1:30
    Delivery Mode
    On-site
    Entry Requirement
    Schedule A Consultation
    View Course BrochureRegister NowBook Your SlotView BrochureView Brochure

    Secure Your Future

    Find out more about how we can help you secure your future in cybersecurity

    Talk to us on
    WhatsApp!