Digital Forensics

Foundations in Digital Forensics

This is a five-day course is designed for the investigator/examiner entering the field of digital forensics and provides the fundamental knowledge to comprehend and investigate incidents involving electronic devices. The course covers in depth architecture and functionality of the NTFS and FAT File Systems and their related metadata pertaining to stored objects on the physical media. Attendees will gain insight into partitioning structures and disk layouts and the effects of formatting volumes that contain existing data. File management and directory structure characteristics will be examined in detail as well as techniques for discovering potential evidence that maybe pivotal to a successful examination. This will be followed by topical areas of interest to include file headers and file hashing and recovery of deleted files and basic analysis of a windows-based system. This course incorporates an investigative scenario, providing hands-on experience with examination of collected evidence.

Windows® 10 Advanced Analysis

The Advanced Windows® 10 Forensic analysis class is an expert-level four-day training course, designed for examiners who are familiar with the principles of digital forensics and keen to expand their knowledge on advanced forensics using a host of third-party tools to improve their computer investigations.

Students will learn to use various applications and utilities to successfully identify, process, understand and document numerous Windows® artifacts that are vitally important to forensic investigations. The participant will also gain knowledge on how to process Edge browser history, cookies, temp files InPrivate browsing challenges and analysis, BitLocker encryption, Windows® Action Center (Notifications SQLite Database) and other Windows® 10 specific artifacts. The course includes gaining in depth knowledge of JumpLists, Registry analysis and prefetch files, Timeline and how they relate to forensic investigations and conclude with an in-depth look into OneDrive and synchronization processes between trusted devices. Students will use a variety of open source and leading forensic applications to examine key artifacts through multiple hands on labs and student practical’s.

What You Will Learn

  • Windows® 10 Artifact Overview
    • Examine the version characteristics between Windows® 10 Operating systems
  • BitLocker Encryption
    • Explore the challenges the recent update has presented to the forensic examiner BitLocker, Learn how BitLocker encryption functions, Learn of examination techniques of a BitLocked volume.
  • Exercises in Workflows
    • Define the forensic importance of Windows® Registry artifacts, Examine a Registry block structure, Define a Registry key structure, User Activity analysis  Application Usage, Windows® Shortcuts
  • Deep dive into Jump List Analysis
    • Learn of the correction between the Distributed Link Tracking Service and Windows® link files, Explore the structure of Jump List data files, Examine effects of destructive processes on jump lists
  • Learn of File System artifacts associated with user activity on host files and link file creation.
  • Windows® Timeline
    • Learn of the new Timeline feature introduced with Windows® 10 – 1803, Review the backend storage locations of application data, Gain knowledge on how SQLite databases function & explore artifacts stored in backend SQLite database, Compare local account storage configurations Vs. OneDrive and SharePoint accounts.
  • Windows® Immersive Applications review
    • Describe the purpose of Live Tiles, Examine backend structures of Immersive apps,  Describe the function of each folder location storing user cached data.
  • Windows® 10 Notifications
    • Learn of the Action Centre functionality, Review the backend storage locations the Notifications database,  Explore artifacts stored in the backend SQLite database,  Write SQL queries to present data in a clearer format,  Describe the correlation between displayed images on live tiles and backend storage.
  • Photo’s Application Artifacts
    • Review the Photo’s application from a user perspective, Identify storage locations of cached data,  Identify recently viewed files,  Examine the TimeLine Cache data file and its implications, Learn of key artifacts identified within the SQL database, Geo Location Folder identification, Date and Times of interactions,  Camera metadata
  • Cortana Integration
    • Learn of Microsoft digital assistant, Identify storage location of hosted data, Identify key folder locations of collected data, Review data stored in txt, cfg, ttl and JSON structured files pertaining to Cortana’s collection phases, Discuss cloud integration and synchronization processes.
  • Edge Browser Forensics
    • Review the Edge Browser application, Locate key folders of interested within the user profile, Identify cached data from untrusted and trusted sites, Learn of Edge Recovery stores and processing techniques, Explore InPrivate browsing and learn of recoverable artifacts, Learn of the new data storage files and their interpretation, Extensive hands on processing techniques.
  • OneDrive – Cloud Synchronization
    • Review the function of the OneDrive, Locate key folders of interest, Identify the locations of user files, explore the many artifacts located in the Synchronization logs, Learn how to interoperate user settings, Discover Office 365 cloud integration, Use the registry to locate recent file interaction, Interpret stored data in the subkeys, Introduction to Office 365 synchronized data.
  • Windows® 10 Mail
    • Learn of the function of the default Mail client, Explore the locations of Trusted and Untrusted data, Review the “Comms” folder and ESE structured database, Extract key data from the Store.vol ese database, Review the storage of email data within the sub-folders of the Comms and S0 folders, Learn techniques on correlating data in the ESE database and files in the sub-folders


© Copyright - Traversed • 7164 Columbia Gateway Dr., Suite 120, Columbia, MD 21046 • 443-832-4133