SDF: Shimcache Forensics

  • Overview
  • Curriculum
  • Instructor
  • Review

About This Course

Learn how an analyze Windows Shimcache evidence

Welcome to the Surviving Digital Forensics series. This class is focused on helping you become a better computer forensic examiner by understanding how to use Windows Shimcache data to prove file use and knowledge - all in about one hour.

As with previous SDF classes you will learn by doing. The class begins with Windows Shimcache fundamentals and will provide an understanding of how the artifact works. Then students delve into several validation exercises to observe how user driven activity affects Windows Shimcache evidence. The last section teaches students how to use freely available DFIR community built forensic tools to examine Shimcache evidence. By the end of the class students will have a solid understanding of how to use the Windows Shimcache as evidence, understand the types of user behaviors that affect the Shimcache and know how to use Windows Shimcache forensic tools.

Expert and novice computer forensic examiners alike will gain from this class. Since we are doing it the SDF way we are going to teach you real computer forensic skills that you can apply using our method or with any forensic tool you choose. Therefore you are not just going to learn about the Windows Shimcache but you will learn a method you can use to answer questions that may come up in the future.

A PC running Windows 8 or Windows 10 is required for this course. The forensic tools we use are all freely available, so beyond your laptop and operating system all you need is the desire to become a better computer forensic examiner.

  • Understand the Shimcache artifact

  • Be able to explain Shimcache evidence

  • Learn the user behaviors that affect the artifact

Instructor

Profile photo of Michael Leclair
Michael Leclair

Over 20 years of experience in Digital Forensics and Security Incident Response. Investigations span corporate (Fortune 500) incident response, technical litigation support for civil and criminal cases, and e-discovery. Author and developer of computer forensic training and analysis tools. Specialties include Windows forensics, Linux forensics, Mac forensics, & mobile device forensics. Certifications include: C|EH, CFCE, CISSP, EnCE, CCE

Review
4.9 course rating
4K ratings
ui-avatar of Kai Philipp Walter Kötter
Kai P. W. K.
5.0
2 years ago

Gute Einführung in das Thema, hat mir sehr geholfen.

  • Helpful
  • Not helpful
ui-avatar of Rupesh Vihire
Rupesh V.
4.5
2 years ago

nice course content and explanation

  • Helpful
  • Not helpful
ui-avatar of Felipe Duarte
Felipe D.
5.0
3 years ago

Wow

  • Helpful
  • Not helpful
ui-avatar of Daniel Septianto
Daniel S.
5.0
3 years ago

thank you

  • Helpful
  • Not helpful
ui-avatar of Veronica Zvereva
Veronica Z.
5.0
3 years ago

This series is the best. Nothing more to add)))

  • Helpful
  • Not helpful
ui-avatar of Marguerite L. Tomlin
Marguerite L. T.
5.0
5 years ago

Great class!

  • Helpful
  • Not helpful
ui-avatar of Rajender Singh Rana
Rajender S. R.
5.0
5 years ago

An excellent explanation in simple terms and elaboration of each and every aspect. Pace of the lecture is perfect.

  • Helpful
  • Not helpful
ui-avatar of Clinton Maxwell
Clinton M.
5.0
5 years ago

Great step by step instruction, smooth pace, and bonus scripts instead of having to manually create them at the end.

  • Helpful
  • Not helpful
ui-avatar of serge Delabrosse
Serge D.
5.0
5 years ago

An interesting Course , I counsel it warmly, very informative and useful !

  • Helpful
  • Not helpful
ui-avatar of Apoorva K A
Apoorva K. A.
5.0
5 years ago

The tutor is really good, enjoyed all the sessions, and he is clear with explaining the concepts.

  • Helpful
  • Not helpful
Leave A Reply

Your email address will not be published. Required fields are marked *

Ratings

Courses You May Like

Lorem ipsum dolor sit amet elit
Show More Courses