Practical Windows Forensics Book Description
In the last several years, the number of cybercrime has grown quickly. We’ve witnessed numerous serious attacks on the governmental and financial, military and media industries. The investigation of all the attacks and crimes involves an in-depth understanding of the operating system’s operations and how to obtain evidence-based information from digital evidence, and how to make the most effective use of digital tools and techniques used in forensics. No matter what degree of expertise within the realm of security for information generally this book will provide you with the basics of digital Forensics. It will equip you with the skills required to collect diverse types of evidence in a way that is effective and guide through the different stages of the process of analysis.
We begin by discussing the basic principles behind the digital forensics process , and proceed to demonstrate the methods used to analyze data. Then, we will look at the various tools that are used to perform live analysis, and then examine various methods to analyse the data that is volatile and non-volatile.
For Whom This Book Is For
This book is aimed at professionals and forensic analysts looking to improve their capabilities with digital for forensic analyses using Windows. Windows platform. The book will help you acquire competence, knowledge of the fundamentals required to conduct forensic analyses using digital files.
Experience with the field of information security and forensic analysis could be beneficial. You will acquire knowledge and an understanding of the process of an analysis of forensics using tools specifically designed specifically for Windows. Windows platform.
What You’ll Learn
- Lively analyze suspect or victim Windows systems remotely or locally
- Know the distinct characteristics and methods of acquisition for volatile and non-volatile information.
- Create a timeline of all system actions taken to bring back the chronology that an accident had.
- Data analysis and recovery from FAT and NTFS files systems.
- Use a variety of tools to conduct registry analysis.
- Monitor a user’s browsing and e-mail activity to test or disprove certain hypothesis.
- Learn how to analyse and dump the memory of your computer.