Hotline: 1800 PROGRESO (1800 776 4737)


Surviving Digital Forensics: Link Files
Windows LINK files are a great source of information when your aim is proving file use and knowledge during a computer forensic investigation. This course goes beyond automated results and digs into the body of a LINK file in order to understand how it is constructed and how to manually pull out and interpret the data. Through a series of hands-on validation exercises and practical exercises you will gain a firm understanding of how LINK file data is affected by different types of user driven behavior. Using all freely available tools, this course takes you through the process of understanding what automated tools do under the hood - all in about an hour.
 
Source material for the practical exercises is provided. Just bring your Windows 7 or Windows 8 system and a desire to learn.
 
What are the requirements?
  • Windows 7 or Windows 8 computer system
  • Basic computer forensic fundamentals
  • Basic Windows computer fundamentals
What am I going to get from this course?
  • Learn how to interpret LINK files on Windows 7 & Windows 8 systems
  • Learn how to tie a specific User account to LINK file activity
  • Learn to identify first and last file access times using LINK files
  • Learn how to discover the drive letter, volume name and file path of accessed files using LINK file data
  • Learn how User activity affects LINK file evidence
  • Learn how to manually locate and decode embedded LINK file data such as MAC times
  • Learn to do all of this using freely available computer forensic tools
What is the target audience?
  • Computer forensic analysts
  • IT Professionals
  • Computer crime investigators
  • Students
 
Click HERE for the Course Outline.
 
Use Coupon Code: PROGRESO30 for 30% discount.
 
 
Course Schedule
Related Courses
Cisco CCNA Security: The A, B, C's of IPv6
This course covers IPv6 protocol in detail. It will compare the differences between the IPv4 to IPv6, and the benefits that IPv6 brings to the...
IPv6 Essentials - Foundations of the new Internet Protocol
This course covers all major aspects of the new Internet Protocol and what changed, compared to IPv4.
IPv6 - learn the basics of the new IP protocol
Understand how IPv6 works. Difference between the address spaces. How Ipv6 addresses are constructed and shortened.
Introduction to the Internet of Everything Preview
Internet and its evolution to the interconnection of people, processes, data, and things
Introduction to Cyber Security - SkillsFuture Approved
Learn the basic and vital components of Cyber Security & Cyberspace. In this course you learn cyber security components!
The Complete Cyber Security Course : Network Security!
Volume 2 : Network Security, WiFi Security, WiFi Hackers, Firewalls, Wireshark. Plus the Best Password Managers
Hacking & Digital Forensics & Autopsy - Stay Anonymous
With Technology Advancement, staying anonymous and protecting your online and offline activities is critical.
Internet and Computer Security: Protect Yourself Online!
Learn how to protect your identity and information online using tried and tested techniques, tips and tricks.
Become Computer Forensics Expert & Start your career!
The best Computer Forensics course! From Beginner to Professional.
Surviving Digital Forensics: Memory Analysis 1
Learn how to identify suspicious processes running in Windows memory
Surviving Digital Forensics: Resolving Attached USBs
A forensic guide for linking USB activity to Windows computer systems
Surviving Digital Forensics: Windows Prefetch
Helping you sharpen your computer forensic skills to prove file use and knowledge.
 
Your Name
Contact No
E-mail
Subject
Message
Text Limit :
Security Code
 
10
824
96