Companies Home Search Profile

FOR500 Windows Forensic Analysis

Focused View

20:20:17

80 View
    1. Welcome to Your SANS OnDemand Course
  • 1.mp4
    00:01
  • 2.mp4
    00:01
  • 3.mp4
    00:01
  • 4.mp4
    00:01
  • 5.mp4
    00:01
  • 6.mp4
    00:01
  • 7.mp4
    00:01
  • 8.mp4
    10:36
    2. Introduction to Lab Exercises
  • 1.mp4
    00:01
  • 2.mp4
    00:01
  • 3.mp4
    00:01
  • 4.mp4
    00:01
  • 5.mp4
    00:01
  • 6.mp4
    00:01
  • 7.mp4
    00:01
  • 8.mp4
    00:01
  • 9.mp4
    00:01
    1. Welcome to Windows Forensic Analysis For500
  • 1.mp4
    00:01
  • 2.mp4
    05:10
  • 3.mp4
    01:28
  • 4.mp4
    06:11
  • 5.mp4
    00:01
    2. The Donald Blake Case
  • 1.mp4
    01:15
  • 2.mp4
    00:01
  • 3.mp4
    00:57
  • 4.mp4
    00:38
  • 5.mp4
    08:02
  • 6.mp4
    00:42
  • 7.mp4
    00:23
  • 8.mp4
    00:29
    3. Core Windows Forensics Focus on Analysis
  • 1.mp4
    04:06
  • 2.mp4
    01:38
  • 3.mp4
    08:29
  • 4.mp4
    05:03
  • 5.mp4
    03:14
    4. Memory and Triage Acquisition
  • 1.mp4
    03:12
  • 2.mp4
    12:42
  • 3.mp4
    02:32
  • 4.mp4
    00:28
  • 5.mp4
    00:50
  • 6.mp4
    05:10
  • 7.mp4
    04:12
  • 8.mp4
    01:29
  • 9.mp4
    00:51
  • 10.mp4
    03:14
  • 11.mp4
    00:32
  • 12.mp4
    00:07
  • 13.mp4
    02:04
  • 14.mp4
    04:00
  • 15.mp4
    01:06
  • 16.mp4
    01:05
  • 17.mp4
    03:00
  • 18.mp4
    00:01
  • 19.mp4
    06:31
  • 20.mp4
    00:59
  • 21.mp4
    01:31
  • 22.mp4
    00:23
  • 23.mp4
    01:31
    5. Mounting Disk Images
  • 1.mp4
    01:12
  • 2.mp4
    00:41
  • 3.mp4
    00:32
  • 4.mp4
    01:33
  • 5.mp4
    00:27
  • 6.mp4
    00:29
  • 7.mp4
    03:55
  • 8.mp4
    11:54
  • 9.mp4
    07:14
  • 10.mp4
    04:29
  • 11.mp4
    00:11
    6. Filesystem Overview
  • 1.mp4
    01:06
  • 2.mp4
    00:01
  • 3.mp4
    07:12
  • 4.mp4
    02:02
  • 5.mp4
    15:11
  • 6.mp4
    00:25
  • 7.mp4
    00:53
  • 8.mp4
    00:30
  • 9.mp4
    06:58
  • 10.mp4
    05:43
  • 11.mp4
    06:43
  • 12.mp4
    00:24
  • 13.mp4
    00:37
  • 14.mp4
    00:34
  • 15.mp4
    11:14
    7. Advanced Acquisition
  • 1.mp4
    01:16
  • 2.mp4
    00:07
  • 3.mp4
    01:00
  • 4.mp4
    07:21
  • 5.mp4
    05:36
    8. Data Stream Carving
  • 1.mp4
    04:13
  • 2.mp4
    00:01
  • 3.mp4
    00:40
  • 4.mp4
    02:09
  • 5.mp4
    00:38
  • 6.mp4
    08:56
  • 7.mp4
    00:25
  • 8.mp4
    17:46
  • 9.mp4
    00:01
    9. File Metadata
  • 1.mp4
    01:29
  • 2.mp4
    00:38
  • 3.mp4
    00:52
  • 4.mp4
    00:37
  • 5.mp4
    00:13
    10. File Carving
  • 1.mp4
    02:53
  • 2.mp4
    00:01
  • 3.mp4
    00:36
  • 4.mp4
    01:25
  • 5.mp4
    00:08
  • 6.mp4
    01:19
  • 7.mp4
    06:56
  • 8.mp4
    00:01
  • 9.mp4
    00:01
    11. Quiz
  • 1.mp4
    00:01
    12. Student Course Evaluation Section 1
  • 1.mp4
    00:01
    1. Registry Forensics
  • 1.mp4
    02:14
  • 2.mp4
    00:01
  • 3.mp4
    00:01
  • 4.mp4
    02:41
  • 5.mp4
    02:00
  • 6.mp4
    01:04
  • 7.mp4
    10:57
  • 8.mp4
    01:41
  • 9.mp4
    05:01
  • 10.mp4
    00:52
  • 11.mp4
    00:19
  • 12.mp4
    00:21
  • 13.mp4
    06:02
  • 14.mp4
    02:49
  • 15.mp4
    03:21
  • 16.mp4
    00:40
  • 17.mp4
    01:38
    2. Registry Forensic Analysis
  • 1.mp4
    01:19
  • 2.mp4
    01:28
  • 3.mp4
    06:53
  • 4.mp4
    00:09
  • 5.mp4
    05:15
  • 6.mp4
    01:28
  • 7.mp4
    00:52
    3. Collecting User Information
  • 1.mp4
    01:12
  • 2.mp4
    02:04
  • 3.mp4
    00:07
  • 4.mp4
    01:16
  • 5.mp4
    03:18
  • 6.mp4
    00:01
  • 7.mp4
    12:23
    4. Examining System Configuration
  • 1.mp4
    02:40
  • 2.mp4
    00:52
  • 3.mp4
    00:14
  • 4.mp4
    03:39
  • 5.mp4
    02:34
  • 6.mp4
    00:09
  • 7.mp4
    02:02
  • 8.mp4
    00:20
  • 9.mp4
    02:03
  • 10.mp4
    00:28
  • 11.mp4
    00:37
  • 12.mp4
    00:21
  • 13.mp4
    02:35
  • 14.mp4
    02:16
  • 15.mp4
    00:43
  • 16.mp4
    00:17
  • 17.mp4
    00:01
  • 18.mp4
    00:41
  • 19.mp4
    01:45
  • 20.mp4
    08:23
  • 21.mp4
    00:13
  • 22.mp4
    00:36
  • 23.mp4
    00:18
  • 24.mp4
    00:47
  • 25.mp4
    00:11
  • 26.mp4
    00:08
  • 27.mp4
    00:22
  • 28.mp4
    00:09
  • 29.mp4
    00:14
  • 30.mp4
    14:15
    5. Analyzing User and Program Execution Activity
  • 1.mp4
    04:17
  • 2.mp4
    04:20
  • 3.mp4
    03:27
  • 4.mp4
    04:40
  • 5.mp4
    15:07
  • 6.mp4
    02:19
  • 7.mp4
    00:34
  • 8.mp4
    06:43
  • 9.mp4
    03:38
  • 10.mp4
    00:08
  • 11.mp4
    01:02
  • 12.mp4
    02:52
  • 13.mp4
    05:15
  • 14.mp4
    01:32
  • 15.mp4
    02:51
  • 16.mp4
    00:01
    6. Analyzing Program Execution Activity
  • 1.mp4
    00:01
  • 2.mp4
    02:23
  • 3.mp4
    01:46
  • 4.mp4
    01:13
  • 5.mp4
    07:26
  • 6.mp4
    12:44
  • 7.mp4
    00:10
  • 8.mp4
    02:10
  • 9.mp4
    07:29
  • 10.mp4
    00:26
  • 11.mp4
    00:50
  • 12.mp4
    01:36
  • 13.mp4
    00:17
  • 14.mp4
    00:35
  • 15.mp4
    01:20
  • 16.mp4
    01:20
  • 17.mp4
    00:01
  • 18.mp4
    00:07
  • 19.mp4
    32:51
  • 20.mp4
    00:01
  • 21.mp4
    00:01
    7. Quiz
  • 1.mp4
    00:01
    8. Student Course Evaluation Section 2
  • 1.mp4
    00:01
    1. Core Windows Forensics II USB Devices and Shell Items Introduction
  • 1.mp4
    00:01
  • 2.mp4
    00:01
  • 3.mp4
    00:01
  • 4.mp4
    01:23
  • 5.mp4
    03:53
    2. Shell Item Analysis
  • 1.mp4
    00:01
  • 2.mp4
    01:03
  • 3.mp4
    05:52
  • 4.mp4
    01:03
  • 5.mp4
    00:41
  • 6.mp4
    15:48
  • 7.mp4
    01:57
  • 8.mp4
    00:22
  • 9.mp4
    00:43
  • 10.mp4
    01:40
  • 11.mp4
    00:08
  • 12.mp4
    00:27
  • 13.mp4
    09:05
  • 14.mp4
    01:34
  • 15.mp4
    35:11
  • 16.mp4
    02:11
  • 17.mp4
    01:20
  • 18.mp4
    00:44
  • 19.mp4
    01:07
  • 20.mp4
    00:30
  • 21.mp4
    00:29
  • 22.mp4
    08:49
  • 23.mp4
    00:20
  • 24.mp4
    03:58
  • 25.mp4
    00:01
  • 26.mp4
    08:58
  • 27.mp4
    00:08
  • 28.mp4
    00:45
  • 29.mp4
    00:17
  • 30.mp4
    01:06
  • 31.mp4
    03:27
  • 32.mp4
    05:57
  • 33.mp4
    00:58
  • 34.mp4
    06:47
  • 35.mp4
    00:01
  • 36.mp4
    01:51
  • 37.mp4
    06:56
  • 38.mp4
    00:21
  • 39.mp4
    01:25
  • 40.mp4
    00:33
  • 41.mp4
    00:16
  • 42.mp4
    21:27
  • 43.mp4
    00:14
  • 44.mp4
    01:00
  • 45.mp4
    03:02
    3. Analyzing USB Devices
  • 1.mp4
    00:01
  • 2.mp4
    02:58
  • 3.mp4
    03:11
  • 4.mp4
    00:42
  • 5.mp4
    00:36
  • 6.mp4
    01:20
  • 7.mp4
    02:06
  • 8.mp4
    00:57
  • 9.mp4
    01:20
  • 10.mp4
    00:12
  • 11.mp4
    00:39
  • 12.mp4
    04:14
  • 13.mp4
    01:13
  • 14.mp4
    02:12
  • 15.mp4
    03:23
  • 16.mp4
    00:22
  • 17.mp4
    01:13
  • 18.mp4
    01:54
  • 19.mp4
    01:44
  • 20.mp4
    00:42
  • 21.mp4
    03:37
  • 22.mp4
    00:21
  • 23.mp4
    01:55
  • 24.mp4
    00:20
  • 25.mp4
    00:26
  • 26.mp4
    00:32
  • 27.mp4
    01:00
  • 28.mp4
    01:36
  • 29.mp4
    00:23
  • 30.mp4
    00:01
  • 31.mp4
    00:01
  • 32.mp4
    00:01
  • 33.mp4
    01:26
  • 34.mp4
    00:37
  • 35.mp4
    00:07
  • 36.mp4
    00:46
  • 37.mp4
    00:54
  • 38.mp4
    00:08
  • 39.mp4
    01:15
  • 40.mp4
    00:01
  • 41.mp4
    00:01
  • 42.mp4
    00:01
  • 43.mp4
    30:17
  • 44.mp4
    00:19
    4. Quiz
  • 1.mp4
    00:01
    5. Student Course Evaluation Section 3
  • 1.mp4
    00:01
    1. Email Forensics
  • 1.mp4
    00:01
  • 2.mp4
    05:27
  • 3.mp4
    00:01
  • 4.mp4
    08:04
  • 5.mp4
    01:35
  • 6.mp4
    07:19
  • 7.mp4
    00:55
  • 8.mp4
    11:04
  • 9.mp4
    02:18
  • 10.mp4
    03:25
  • 11.mp4
    03:00
  • 12.mp4
    00:10
  • 13.mp4
    00:18
  • 14.mp4
    00:32
  • 15.mp4
    00:52
  • 16.mp4
    00:35
  • 17.mp4
    02:17
  • 18.mp4
    00:37
  • 19.mp4
    00:26
  • 20.mp4
    00:27
  • 21.mp4
    00:24
  • 22.mp4
    00:28
  • 23.mp4
    00:29
  • 24.mp4
    01:47
  • 25.mp4
    01:08
  • 26.mp4
    04:48
  • 27.mp4
    00:12
  • 28.mp4
    00:39
  • 29.mp4
    01:36
  • 30.mp4
    00:37
  • 31.mp4
    00:21
  • 32.mp4
    01:26
  • 33.mp4
    04:28
  • 34.mp4
    00:05
  • 35.mp4
    00:33
  • 36.mp4
    00:35
  • 37.mp4
    01:00
  • 38.mp4
    00:06
  • 39.mp4
    00:24
  • 40.mp4
    00:43
  • 41.mp4
    00:27
  • 42.mp4
    01:52
  • 43.mp4
    05:12
  • 44.mp4
    00:01
    2. Additional Artifacts
  • 1.mp4
    00:01
  • 2.mp4
    00:01
  • 3.mp4
    00:16
  • 4.mp4
    00:47
  • 5.mp4
    02:07
  • 6.mp4
    01:29
  • 7.mp4
    01:42
  • 8.mp4
    09:00
  • 9.mp4
    01:14
  • 10.mp4
    01:03
  • 11.mp4
    00:12
  • 12.mp4
    01:39
  • 13.mp4
    00:56
  • 14.mp4
    01:29
  • 15.mp4
    01:05
  • 16.mp4
    00:48
  • 17.mp4
    01:32
  • 18.mp4
    00:33
  • 19.mp4
    00:01
  • 20.mp4
    00:01
  • 21.mp4
    00:01
  • 22.mp4
    00:01
  • 23.mp4
    02:03
  • 24.mp4
    05:05
  • 25.mp4
    00:55
  • 26.mp4
    14:23
  • 27.mp4
    00:21
  • 28.mp4
    00:01
  • 29.mp4
    00:18
  • 30.mp4
    00:12
  • 31.mp4
    04:54
  • 32.mp4
    10:27
  • 33.mp4
    00:01
  • 34.mp4
    00:01
  • 35.mp4
    03:35
  • 36.mp4
    02:26
  • 37.mp4
    01:10
  • 38.mp4
    00:24
  • 39.mp4
    02:37
  • 40.mp4
    00:01
  • 41.mp4
    01:14
  • 42.mp4
    00:04
  • 43.mp4
    00:32
  • 44.mp4
    00:34
  • 45.mp4
    00:21
  • 46.mp4
    00:28
  • 47.mp4
    00:26
  • 48.mp4
    15:32
  • 49.mp4
    00:20
  • 50.mp4
    00:22
  • 51.mp4
    01:04
  • 52.mp4
    01:07
  • 53.mp4
    00:01
    3. Event Log Analysis
  • 1.mp4
    00:01
  • 2.mp4
    03:30
  • 3.mp4
    00:42
  • 4.mp4
    00:15
  • 5.mp4
    00:55
  • 6.mp4
    00:49
  • 7.mp4
    01:35
  • 8.mp4
    06:13
  • 9.mp4
    01:02
  • 10.mp4
    00:51
  • 11.mp4
    03:36
  • 12.mp4
    00:34
  • 13.mp4
    00:32
  • 14.mp4
    00:01
  • 15.mp4
    00:32
  • 16.mp4
    00:19
  • 17.mp4
    00:14
  • 18.mp4
    01:27
  • 19.mp4
    00:27
  • 20.mp4
    03:29
  • 21.mp4
    00:13
  • 22.mp4
    03:20
  • 23.mp4
    00:29
  • 24.mp4
    00:11
  • 25.mp4
    00:53
  • 26.mp4
    00:37
  • 27.mp4
    00:33
  • 28.mp4
    03:14
  • 29.mp4
    01:57
  • 30.mp4
    00:38
  • 31.mp4
    00:35
  • 32.mp4
    01:05
  • 33.mp4
    00:40
  • 34.mp4
    00:05
  • 35.mp4
    00:36
  • 36.mp4
    00:32
  • 37.mp4
    00:01
  • 38.mp4
    00:01
  • 39.mp4
    03:57
  • 40.mp4
    00:01
  • 41.mp4
    00:01
  • 42.mp4
    00:01
  • 43.mp4
    00:01
    4. Quiz
  • 1.mp4
    00:01
    5. Student Course Evaluation Section 4
  • 1.mp4
    00:01
    1. Core Windows Forensics IVInternet Browers Introduction
  • 1.mp4
    00:01
  • 2.mp4
    00:01
  • 3.mp4
    00:01
    2. Brief Intro to 508
  • 1.mp4
    00:01
  • 2.mp4
    00:01
  • 3.mp4
    00:01
    3. Internet Browser Forensics
  • 1.mp4
    00:43
  • 2.mp4
    03:44
  • 3.mp4
    01:20
  • 4.mp4
    02:30
  • 5.mp4
    04:50
    4. Internet Explorer Overview
  • 1.mp4
    01:13
  • 2.mp4
    01:11
  • 3.mp4
    04:43
  • 4.mp4
    00:43
  • 5.mp4
    00:18
  • 6.mp4
    00:04
  • 7.mp4
    00:28
  • 8.mp4
    00:17
  • 9.mp4
    07:33
  • 10.mp4
    10:10
  • 11.mp4
    00:54
  • 12.mp4
    02:25
  • 13.mp4
    02:18
  • 14.mp4
    00:05
  • 15.mp4
    00:26
  • 16.mp4
    00:15
  • 17.mp4
    00:14
  • 18.mp4
    17:31
  • 19.mp4
    00:05
  • 20.mp4
    00:23
  • 21.mp4
    00:18
  • 22.mp4
    00:30
  • 23.mp4
    00:14
  • 24.mp4
    03:13
  • 25.mp4
    01:37
  • 26.mp4
    00:26
  • 27.mp4
    00:04
  • 28.mp4
    00:56
  • 29.mp4
    01:03
  • 30.mp4
    00:05
  • 31.mp4
    00:28
  • 32.mp4
    01:34
  • 33.mp4
    01:28
  • 34.mp4
    00:30
  • 35.mp4
    01:19
  • 36.mp4
    00:30
  • 37.mp4
    00:35
  • 38.mp4
    00:31
  • 39.mp4
    00:46
  • 40.mp4
    02:35
  • 41.mp4
    00:36
  • 42.mp4
    00:31
  • 43.mp4
    01:06
  • 44.mp4
    01:00
  • 45.mp4
    00:48
  • 46.mp4
    01:44
  • 47.mp4
    00:35
  • 48.mp4
    00:01
  • 49.mp4
    00:04
  • 50.mp4
    13:16
  • 51.mp4
    01:22
    5. Edge Overview
  • 1.mp4
    01:08
  • 2.mp4
    00:23
  • 3.mp4
    00:28
  • 4.mp4
    00:38
  • 5.mp4
    00:30
  • 6.mp4
    00:41
  • 7.mp4
    05:41
    6. Firefox Overview
  • 1.mp4
    01:48
  • 2.mp4
    00:01
  • 3.mp4
    02:11
  • 4.mp4
    00:48
  • 5.mp4
    00:31
  • 6.mp4
    02:29
  • 7.mp4
    01:03
  • 8.mp4
    00:46
  • 9.mp4
    00:27
  • 10.mp4
    00:26
  • 11.mp4
    02:06
  • 12.mp4
    00:20
  • 13.mp4
    00:20
  • 14.mp4
    00:13
  • 15.mp4
    03:52
  • 16.mp4
    00:48
  • 17.mp4
    00:47
  • 18.mp4
    01:40
  • 19.mp4
    00:47
  • 20.mp4
    00:50
  • 21.mp4
    00:28
  • 22.mp4
    03:01
  • 23.mp4
    00:34
  • 24.mp4
    00:23
  • 25.mp4
    01:06
  • 26.mp4
    00:48
  • 27.mp4
    00:53
  • 28.mp4
    00:47
  • 29.mp4
    00:43
  • 30.mp4
    00:50
  • 31.mp4
    01:41
  • 32.mp4
    05:32
  • 33.mp4
    00:14
  • 34.mp4
    00:54
  • 35.mp4
    00:01
  • 36.mp4
    01:38
    7. Chrome Overview
  • 1.mp4
    01:36
  • 2.mp4
    09:57
  • 3.mp4
    02:34
  • 4.mp4
    00:55
  • 5.mp4
    00:25
  • 6.mp4
    00:31
  • 7.mp4
    01:25
  • 8.mp4
    00:23
  • 9.mp4
    00:54
  • 10.mp4
    01:04
  • 11.mp4
    00:45
  • 12.mp4
    00:18
  • 13.mp4
    04:05
  • 14.mp4
    00:25
  • 15.mp4
    00:31
  • 16.mp4
    00:31
  • 17.mp4
    00:30
  • 18.mp4
    00:54
  • 19.mp4
    00:26
  • 20.mp4
    01:31
  • 21.mp4
    00:21
  • 22.mp4
    00:34
  • 23.mp4
    00:47
  • 24.mp4
    01:13
  • 25.mp4
    00:30
  • 26.mp4
    08:13
  • 27.mp4
    00:56
  • 28.mp4
    00:24
  • 29.mp4
    00:43
    8. Private Browsing
  • 1.mp4
    00:42
  • 2.mp4
    01:14
  • 3.mp4
    00:36
  • 4.mp4
    00:35
  • 5.mp4
    00:32
  • 6.mp4
    00:33
  • 7.mp4
    00:35
  • 8.mp4
    00:28
  • 9.mp4
    00:46
  • 10.mp4
    01:28
  • 11.mp4
    01:41
  • 12.mp4
    00:59
  • 13.mp4
    00:58
  • 14.mp4
    00:10
  • 15.mp4
    00:12
  • 16.mp4
    00:16
  • 17.mp4
    00:01
  • 18.mp4
    00:01
  • 19.mp4
    01:29
    9. Quiz
  • 1.mp4
    00:01
    10. Student Course Evaluation Section 5
  • 1.mp4
    00:01
    1. The Forensic Challenge HandsOn Case Study
  • 1.mp4
    04:02
  • 2.mp4
    00:01
  • 3.mp4
    00:01
  • 4.mp4
    00:01
  • 5.mp4
    00:01
  • 6.mp4
    00:01
    2. Student Course Evaluation Section 6
  • 1.mp4
    00:01

More details


User Reviews
Rating
0
0
0
0
0
average 0
Total votes0
Focused display
The SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing.
  • language english
  • Training sessions 614
  • duration 20:20:17
  • Release Date 2023/06/16

Courses related to Cyber Security

Courses related to Network Security

Courses related to Information Security

Courses related to Cyber Security Awareness

Courses related to Computer Forensics