Windows Forensics

Windows Forensics

Windows Forensics

Navigate, Analyse & Protect Your Windows Systems

In Partnership With:
Ngee Ann Pol
View Course Brochure


View Brochure

Course Fee

Full Course Fees

SG Citizen (aged 21-39) or PR

SG Citizen (aged 40 & above)

Full Fees

$19,500

$19,500

$19,500

SkillsFuture Funding

-

$13,650 (70% Subsidy)

$17,550 (90% Subsidy)

Total Nett Fee

$19,500

$5,850

$1,950

GST (9%)

$1,755

$526.5

$526.5

Total Fee Payable

$21,255

$6,376.50

$2,476.50

Additional Funding: SkillsFuture Credits (up to $500), UTAP ($200-$500) & PSEA can be used to pay for course fees after subsidy

Learning Outcomes: 

    Participants will:

    • Gain expertise in handling digital data within Windows environments, from file and disk analysis to metadata examination, employing tools like Hex Editors and FTK.
    • Learn to identify and manipulate hidden files and understand the intricacies of data hiding and extraction techniques within the Windows operating system.
    • Develop the ability to collect and analyze digital artifacts, focusing on registry analysis and evidence extraction methods to enhance digital investigations.
    • Acquire advanced skills in memory, event, network, and malware analysis to dissect complex cyber threats and vulnerabilities.
    • Understand the critical aspects of web application security, identifying common vulnerabilities and employing strategies to secure data transactions and maintain overall application integrity.

    Course Syllabus:

    Chapter 01
    Digital Data

    Files and Disks

    • Encoding
    • Number Systems
    • Digital Sizes
    • Solid State Drive (SSD) Features

    Hex Editor

    • Working with Offsets
    • Viewing Files
    • Viewing Disks

    Automatic Carving

    • Carving Methods
    • Automatic Carvers
    • Windows System Files

    Metadata

    • Viewing Metadata
    • Modified Accessed Created
    • Editing Exif Data

    Steganography

    • Identify Hidden Files
    • Extracting Hidden Files
    • Creating Hidden Files

    Hard Disk Analysis

    • System Files
    • MFT Analysis
    • Working with FTK

    Chapter 02
    File Forensics
    Question text goes here
    • Become familiar with different attack scenarios

    Artefacts

    • Artifact Directories
    • Browsers
    • Shadow Copies

    Registry Analysis

    • Extracting Data
    • NTUSER.DAT Analysis
    • General Search
    • Registry Viewers
    Chapter 03
    Collecting Evidence
    Question text goes here
    • Become familiar with different attack scenarios

    Memory Analysis

    • Creating an Image
    • Working with Volatility
    • Carving Data from RAM

    Events Analysis

    • Event Viewers
    • Setting Audit Policy
    • Custom Search

    Network Analysis

    • Service Protocol Analysis
    • Identifying Darknet Connections

    Malware Analysis

    • Basic Static Analysis
    • Basic Dynamic Analysis
    Chapter 04
    Analysis
    Question text goes here
    • Become familiar with different attack scenarios
    Chapter 05
    Question text goes here
    • Become familiar with different attack scenarios

    Training Schedule:

    Tailored To Client

    Tailored To Client
    Question text goes here

    Training Methodology:

    Apprenticeship-based Training

    • Experience hands-on learning with our demonstration method on a virtual/host machine, ensuring immersive understanding.
    • Our trainers prioritise showing over telling, explaining intricacies without relying on slides, offering direct engagement.
    • Bridge your knowledge gap by connecting theoretical concepts to practical cybersecurity applications, enhancing career readiness.

    Practice Labs

    • Engage in repeated practice sessions to solidify and reinforce your understanding.
    • Delve deeper with practice questions, encouraging students to explore interconnected topics and enhance comprehension.
    • Stimulate critical thinking through challenge questions, prompting students to seek solutions and broaden their problem-solving abilities.

    Assessment and Project

    • Equip yourself with the expertise and tools essential for navigating corporate networks safely.
    • Gain a comprehensive understanding of cyber-attacks to fortify your digital environment effectively.
    • Broaden your horizon by familiarising yourself with diverse cyber-attack scenarios and their implications.

    Question text goes here
    • Become familiar with different attack scenarios

    FAQs:

    Question text goes here
    • Become familiar with different attack scenarios
    Quick Info
    Programme Fee
    Custom Pricing
    Duration
    5 days (8 hours/day)
    Schedule
    Tailored To Client
    Teacher-to-Student Ratio
    1:30
    Delivery Mode
    On-site
    Entry Requirement
    Schedule A Consultation
    View Course BrochureRegister NowBook Your SlotView Brochure

    Secure Your Future

    Find out more about how we can help you secure your future in cybersecurity

    Talk to us on
    WhatsApp!