Windows Forensics

Windows Forensics

Windows Forensics

Navigate, Analyse & Protect Your Windows Systems

In Partnership With:
Ngee Ann Pol

In Partnership With: 

Ngee Ann Polytechnic Logo
View Course Brochure


View Brochure

Course Fee

Full Course Fees

SG Citizen (aged 21-39) or PR

SG Citizen (aged 40 & above)

Full Fees

$19,500

$19,500

$19,500

SkillsFuture Funding

-

$13,650 (70% Subsidy)

$17,550 (90% Subsidy)

Total Nett Fee

$19,500

$5,850

$1,950

GST (9%)

$1,755

$526.5

$526.5

Total Fee Payable

$21,255

$6,376.50

$2,476.50

Additional Funding: SkillsFuture Credits (up to $1,000), UTAP ($200-$500) & PSEA can be used to pay for course fees after subsidy

Programme Fees & Funding

Introduction To Cybersecurity SkillsFuture Funding Table

Learning Outcomes: 

Participants will:

  • Gain expertise in handling digital data within Windows environments, from file and disk analysis to metadata examination, employing tools like Hex Editors and FTK.
  • Learn to identify and manipulate hidden files and understand the intricacies of data hiding and extraction techniques within the Windows operating system.
  • Develop the ability to collect and analyze digital artifacts, focusing on registry analysis and evidence extraction methods to enhance digital investigations.
  • Acquire advanced skills in memory, event, network, and malware analysis to dissect complex cyber threats and vulnerabilities.
  • Understand the critical aspects of web application security, identifying common vulnerabilities and employing strategies to secure data transactions and maintain overall application integrity.
Question text goes here
  • Become familiar with different attack scenarios

Course Syllabus:

Chapter 01
Digital Data

Files and Disks

  • Encoding
  • Number Systems
  • Digital Sizes
  • Solid State Drive (SSD) Features

Hex Editor

  • Working with Offsets
  • Viewing Files
  • Viewing Disks

Automatic Carving

  • Carving Methods
  • Automatic Carvers
  • Windows System Files

Metadata

  • Viewing Metadata
  • Modified Accessed Created
  • Editing Exif Data

Steganography

  • Identify Hidden Files
  • Extracting Hidden Files
  • Creating Hidden Files

Hard Disk Analysis

  • System Files
  • MFT Analysis
  • Working with FTK

Chapter 02
File Forensics
Question text goes here
  • Become familiar with different attack scenarios

Artefacts

  • Artifact Directories
  • Browsers
  • Shadow Copies

Registry Analysis

  • Extracting Data
  • NTUSER.DAT Analysis
  • General Search
  • Registry Viewers
Chapter 03
Collecting Evidence
Question text goes here
  • Become familiar with different attack scenarios

Memory Analysis

  • Creating an Image
  • Working with Volatility
  • Carving Data from RAM

Events Analysis

  • Event Viewers
  • Setting Audit Policy
  • Custom Search

Network Analysis

  • Service Protocol Analysis
  • Identifying Darknet Connections

Malware Analysis

  • Basic Static Analysis
  • Basic Dynamic Analysis
Chapter 04
Analysis
Question text goes here
  • Become familiar with different attack scenarios
Chapter 05
Question text goes here
  • Become familiar with different attack scenarios

Training Schedule:

Tailored To Client

Tailored To Client
Question text goes here

Training Methodology:

Apprenticeship-based Training

  • Experience hands-on learning with our demonstration method on a virtual/host machine, ensuring immersive understanding.
  • Our trainers prioritise showing over telling, explaining intricacies without relying on slides, offering direct engagement.
  • Bridge your knowledge gap by connecting theoretical concepts to practical cybersecurity applications, enhancing career readiness.

Practice Labs

  • Engage in repeated practice sessions to solidify and reinforce your understanding.
  • Delve deeper with practice questions, encouraging students to explore interconnected topics and enhance comprehension.
  • Stimulate critical thinking through challenge questions, prompting students to seek solutions and broaden their problem-solving abilities.

Assessment and Project

  • Equip yourself with the expertise and tools essential for navigating corporate networks safely.
  • Gain a comprehensive understanding of cyber-attacks to fortify your digital environment effectively.
  • Broaden your horizon by familiarising yourself with diverse cyber-attack scenarios and their implications.

Question text goes here
  • Become familiar with different attack scenarios

FAQs:

Question text goes here
  • Become familiar with different attack scenarios

In partnership with: 

Ngee Ann Polytechnic Logo
Quick Info
Programme Fee
Custom Pricing
Duration
5 days (8 hours/day)
Schedule
Tailored To Client
Teacher-to-Student Ratio
1:30
Delivery Mode
On-site
Entry Requirement
Schedule A Consultation
View Course BrochureRegister NowBook Your SlotView BrochureView Brochure

Secure Your Future

Find out more about how we can help you secure your future in cybersecurity

Talk to us on
WhatsApp!