Hotline: 1800 PROGRESO (1800 776 4737)

Surviving Digital Forensics: Windows Prefetch
Welcome to the Surviving Digital Forensics series. This class is focused on helping you become a better computer forensic examiner by understanding how to use Windows Prefetch data to prove file use and knowledge - all in about one hour.
As with previous SDF classes you will learn by doing. The class begins with a brief overview of the Windows Prefetch and an understanding of how it works. Then we will get into a number of validation exercises to see how user activity really affects Windows Prefetch data. Learning is hands on and we will use low cost and no cost computer forensic tools to do so.
Expert and novice computer forensic examiners alike will gain from this class. Since we are doing it the SDF way we are going to teach you real computer forensic skills that you can apply using our method or with any forensic tool you choose. Therefore you are not just going to learn about the Windows Prefetch but you will learn a method you can use to answer questions that may come up in the future.
Class Outline
1. Introduction and Welcome to the SDF series
2. What this class is all about
3. How to get the most of this class
4. What is the Windows Prefetch?
5. About ".pf" files
6. "Open State" issues and other exclusions
7. Prefetch Registry Setting
8. Set up for the practicals
9. Validation Exercise: Running a program for the first time
10. Validation Exercise: Last run time
11. Validation Exercise: Flushing out rogue applications
12. Validation Exercise: Running a program from a USB device
13. Validation Exercise: Proving file use and knowledge
14. Setting up for the student practical
15. Student Practical
16. Windows 7 versus Windows 8
17. Final thoughts about the Prefetch
18. Thank you!
19 How to get your Udemy certificate
A PC running Windows 7 or Windows 8+ is required for this course. The forensic tools we use are all freely available, so beyond your operating system all you need is the desire to become a better computer forensic examiner.
What are the requirements?
  • Windows 7 or Windows 8 system required
  • All in-class forensic programs are freely available and downloads provided
  • Student testing and validation material provided
  • What am I going to get from this course?
  • Use Windows Prefetch data to help prove file use and knowledge
What is the target audience?
  • Computer forensic analysts
  • IT Professionals
  • Students


Click HERE for the Course Outline.
Use Coupon Code: PROGRESO30 for 30% discount.
Course Schedule
Related Courses
Cisco CCNA Security: The A, B, C's of IPv6
This course covers IPv6 protocol in detail. It will compare the differences between the IPv4 to IPv6, and the benefits that IPv6 brings to the...
IPv6 Essentials - Foundations of the new Internet Protocol
This course covers all major aspects of the new Internet Protocol and what changed, compared to IPv4.
IPv6 - learn the basics of the new IP protocol
Understand how IPv6 works. Difference between the address spaces. How Ipv6 addresses are constructed and shortened.
Introduction to the Internet of Everything Preview
Internet and its evolution to the interconnection of people, processes, data, and things
Introduction to Cyber Security - SkillsFuture Approved
Learn the basic and vital components of Cyber Security & Cyberspace. In this course you learn cyber security components!
The Complete Cyber Security Course : Network Security!
Volume 2 : Network Security, WiFi Security, WiFi Hackers, Firewalls, Wireshark. Plus the Best Password Managers
Hacking & Digital Forensics & Autopsy - Stay Anonymous
With Technology Advancement, staying anonymous and protecting your online and offline activities is critical.
Internet and Computer Security: Protect Yourself Online!
Learn how to protect your identity and information online using tried and tested techniques, tips and tricks.
Become Computer Forensics Expert & Start your career!
The best Computer Forensics course! From Beginner to Professional.
Surviving Digital Forensics: Memory Analysis 1
Learn how to identify suspicious processes running in Windows memory
Surviving Digital Forensics: Resolving Attached USBs
A forensic guide for linking USB activity to Windows computer systems
Surviving Digital Forensics: Link Files
A computer forensic guide for understanding LINK file evidence on Windows computer systems
Your Name
Contact No
Text Limit :
Security Code