Surviving Digital Forensics: Windows Shellbags

Surviving Digital Forensics: Windows Shellbags

Surviving Digital Forensics: Windows Shellbags. With the help of this course you can Computer forensic evidence to help prove file use & knowledge.

This course was created by Michael Leclair. It was rated 4.4 out of 5 by approx 10931 ratings. There are approx 55290 users enrolled with this course, so don’t wait to download yours now. This course also includes 1 hour on-demand video, 1 Article, Full lifetime access, Access on mobile and TV & Certificate of Completion.

What Will You Learn?

  • Extract and analyze windows shellbag records to help prove file use and knowledge

  • Use freely available forensic tools to conduct shellbag analysis

  • Construct validation exercises to test how shellbags behave depending on media type

  • Construct validation exercises to test how shellbags behave according to different types of user activity

  • Confidently explain what Windows shellbag evidence is to non-technical audiences

Welcome to the Surviving Digital Forensics series. This series is focused on helping you become a better computer forensic examiner by teaching core computer forensic skills – all in about one hour. In this class examine how to use Windows Shellbag records to help prove file use and knowledge. Shellbag records are created by certain user activity and can be used to show where a user has navigated to on a computer system and when they did so. Very powerful evidence!

As with previous SDF classes you will learn by doing. The class begins with a brief overview of the issue at hand. Then we set up our forensic systems and off we go. Learning is hands on and we will use low cost and no cost computer forensic tools to do so.

Expert and novice computer forensic examiners alike will gain from this class. Since we are doing it the SDF way we are going to teach you real computer forensic skills that you can apply using our method or customize to meet your needs. You will learn how you can use freely available forensic tools, all GUI based, to extract and analyze Windows Shellbag evidence.

Class Outline

1. Introduction and Welcome to the SDF series

2. Getting the most out of the class

3. Windows Shellbags – an overview

5. Shellbag Deep Dive

6. Setting up your forensic system

7. Validation practical 01 – local system activity

8. Validation practical 02 – attached USBs

9. Validation practical 03 – networked drives

10. Student Practical

11. Student Quiz

12. Reporting options

13. Review

14. Conclusion & thank you

A PC running Win7 or Win8 is required for this course. You need admin rights to the system. The system itself should be a test system containing no critical data. The forensic tools we use are all freely available, so beyond your operating system all you need is the desire to become a better computer forensic examiner.

Rating:
4.1

Download Links

Get Download Link

Related Courses

Digital Forensic Series: Computer Forensics

Digital Forensic Series: Mobile Forensics

Digital Forensics for Cyber Professionals

Digital Forensics with Kali Linux

Certified Digital Forensics Examiner (CDFE)

Hacking & Digital Forensics & Autopsy – Stay Anonymous

Beginner’s Brand Survival Guide In A Digital Era

IT Security Gumbo: Web Application Defense

Java: Object-Oriented Programming Concepts

A Complete Guide to OrientDB: A NoSQL Database

Surviving Digital Forensics: Windows Explorer

Surviving Digital Forensics: Windows Explorer

Surviving Digital Forensics: Windows Prefetch

Surviving Digital Forensics: Windows Prefetch

Surviving Digital Forensics: Understanding OS X Time Stamps

Surviving Digital Forensics: Understanding OS X Time Stamps

Surviving Digital Forensics: Memory Analysis 1

Surviving Digital Forensics: Memory Analysis 1

Surviving Digital Forensics: Link Files

Surviving Digital Forensics: Link Files

Surviving Digital Forensics: RAM Extraction Fundamentals

Surviving Digital Forensics: RAM Extraction Fundamentals

Surviving Digital Forensics: Resolving Attached USBs

Surviving Digital Forensics: Resolving Attached USBs

Surviving Digital Forensics: Imaging a Mac Fusion Drive

Surviving Digital Forensics: Imaging a Mac Fusion Drive

Surviving Digital Forensics: Memory Analysis 2

Surviving Digital Forensics: Memory Analysis 2

Surviving Digital Forensics: Volume Shadow Copy

Surviving Digital Forensics: Volume Shadow Copy
Go To Top