This course will familiarize students with all aspects of Windows forensics.By the end of this course students will be able to perform live analysis, capture volatile data, make images of media, analyze filesystems, analyze network traffic, analyze files, perform memory analysis, and analyze malware for a Windows subject on a Linux system with readily available free and open source tools. Students will also gain an in-depth understanding of how Windows works under the covers.
What are cookies?
Cookies are small pieces of text stored on your computer when you visit almost any website. Companies use them to:
- Verify your identity, to ensure your security and privacy
- Determine the browser and settings you are using to provide optimised content
- Understand the way you navigate through websites, so firms can make improvements
- Help site owners and third-party advertisers tailor content to your preferences
We also use social media buttons and/or plugins on this site that allow you to connect with your social network in various ways. For these to work the following social media sites including;
- Linked In
will set cookies through our site, which may be used to enhance your profile on their site or contribute to the data they hold for various purposes outlined in their respective privacy policies.
There are multiple levels of cookie enablement in Chrome. For more information, click here.