Hotline: 1800 PROGRESO (1800 776 4737)


Surviving Digital Forensics: Resolving Attached USBs
Have you ever been asked to find out what the "F" drive is? Have you ever needed to prove a USB drive was attached to a target system? Collecting and presenting this information is a core skill all computer forensic analysts need know. If you have ever struggled with this then this class is for you. This course breaks down the process of collecting and interpreting the data necessary to make the connection between USB device and Windows systems.
 
Using all freely available tools, this course walks you through the process of identifying USB devices that have been attached to a system and shows you how to determine the times they were attached, what the volume names are, what the assigned drive letters were and which user mounted the USB volumes - all of this in about an hour.
 
What are the requirements?
  1. Windows 7+ computer system
  2. Basic computer forensic fundamentals
  3. Basic Windows forensics fundamentals
  4. What am I going to get from this course?
  5. Learn to find information about attached USB devices on Windows 7 & Windows 8 systems
  6. Learn how to tie a specific User account to USB activity
  7. Learn to identify when USB devices were first and last attached to the system
  8. Learn how to discover the volume name and assigned drive letter of attached USB devices
  9. Learn how to extract data that will identify the make and model of attached USB devices
  10. Learn to do all of this using freely available computer forensic tools
What is the target audience?
  • Computer forensic analysts
  • IT Professionals
  • Students

 

Click HERE for the Course Outline.
 
Use Coupon Code: PROGRESO30 for 30% discount.
Course Schedule
Related Courses
Cisco CCNA Security: The A, B, C's of IPv6
This course covers IPv6 protocol in detail. It will compare the differences between the IPv4 to IPv6, and the benefits that IPv6 brings to the...
IPv6 Essentials - Foundations of the new Internet Protocol
This course covers all major aspects of the new Internet Protocol and what changed, compared to IPv4.
IPv6 - learn the basics of the new IP protocol
Understand how IPv6 works. Difference between the address spaces. How Ipv6 addresses are constructed and shortened.
Introduction to the Internet of Everything Preview
Internet and its evolution to the interconnection of people, processes, data, and things
Introduction to Cyber Security - SkillsFuture Approved
Learn the basic and vital components of Cyber Security & Cyberspace. In this course you learn cyber security components!
The Complete Cyber Security Course : Network Security!
Volume 2 : Network Security, WiFi Security, WiFi Hackers, Firewalls, Wireshark. Plus the Best Password Managers
Hacking & Digital Forensics & Autopsy - Stay Anonymous
With Technology Advancement, staying anonymous and protecting your online and offline activities is critical.
Internet and Computer Security: Protect Yourself Online!
Learn how to protect your identity and information online using tried and tested techniques, tips and tricks.
Become Computer Forensics Expert & Start your career!
The best Computer Forensics course! From Beginner to Professional.
Surviving Digital Forensics: Memory Analysis 1
Learn how to identify suspicious processes running in Windows memory
Surviving Digital Forensics: Windows Prefetch
Helping you sharpen your computer forensic skills to prove file use and knowledge.
Surviving Digital Forensics: Link Files
A computer forensic guide for understanding LINK file evidence on Windows computer systems
 
Your Name
Contact No
E-mail
Subject
Message
Text Limit :
Security Code
 
10
824
96