Magnet AXIOM Advanced Computer Forensics (AX250)

  • Beschreibung

    Magnet AXIOM Advanced Computer Forensics (AX250) is an expert-level four-day training course, designed for participants who are familiar with the principles of digital forensics and who are seeking to leverage Magnet AXIOM, Magnet RAM Capture, and third-party tools to improve their computer investigations.

  • Titel

    Magnet AXIOM Advanced Computer Forensics (AX250)
  • Datum

    24.11.2020 - 27.11.2020
  • Kursdauer

    4 Tage
  • Kurssprache

    Deutsch (Unterlagen Englisch)
  • Anmeldefrist

    29.10.2020
  • Status

    Anmeldung
  • Leitung

    Klaus Demmer, Erster Kriminalhauptkommissar a.D.
  • Ort

    Ausbildungszentrum Riedbach, Mannenriedstrasse 29, 3020 Bern, Schweiz
  • Gebühren

    2'843 CHF inkl. Schweizer MwSt.

AX250 will give participants the knowledge and skills they need to track computer access and file usage, utilizing Magnet AXIOM to explore the evidence in greater depth by learning about the newest sign-on technologies — such as pin password, Windows Hello, picture password, fingerprint recognition, and facial recognition.

In this course, a deeper understanding of investigating Windows computers will be provided by searching through artifacts like Windows Notification, Windows System Resource Utilization, Windows Error Reporting (WER) Logs, Event Logs (EVT), Event Tracing Logs (ETL), as well as a breakdown of the taskbar and whether an artifact was system pinned or user pinned to it.

Also, there will be time spent investigating EMDMgmt to dig deep into tracking drives attached to the Windows OS that may leave traces nowhere else. AppCompatFlags and AMCACHE will also be investigated to determine executable files which were previously executed on the system, but no longer exist.

This course will also discuss how to track files and folders based on information in the user profile and information recovered from Shellbags. Maximizing the data from Prefetch files, Jumplists, and Recent Docs to correlate the data recovered from the artifacts previously mentioned above. This course also takes a look at collecting RAM images and parsing those images for actionable intelligence in support of the investigation.

Participants of this course will be utilizing Passware and the AXIOM Wordlist Generator to crack iTunes backups and Windows passwords from information in the image of the suspect hard disk drive including the most up to date versions of that software. Finally, participants of this course will investigate Google Drive, Modern Apps (Windows Store Apps), UsnJrnl and an in-depth look at File history and the extensible Database files tracking it.

Diese Seite drucken

Jetzt anmelden

Ihre Anmeldung für diesen Kurs ist verbindlich.

Teilnehmer

Rechnungsadresse

Bitte füllen Sie sämtliche Felder aus
Ihre E-Mailadresse ist ungültig
Bitte AGB, Datenschutzerklärung, Annullationsbedingungen und ggf. Kenntnisnahme akzeptieren
Bitte füllen Sie das Captcha aus
Wir haben Ihre Anmeldung erhalten
Anmelden