Corporate Investigations with Belkasoft
This course is designed for those who aim to harden the security of their business networks and learn how to enable quick incident response procedures to a variety of data breaches.
Gain hands-on experience in using Belkasoft products for investigation of an insider threat. Various anti-forensics techniques and methods of countering them will be considered during the course. We know how valuable your time is and how difficult it is to plan. This is why we prepared a course where you can study in a safe, comfortable environment and at times that are convenient for you.
Analyze internet artifacts, such as emails and web browsing history, and system artifacts, such as the Windows registry, Windows 10 Timeline and others.
Use the built-in Connection Graph viewer in order to obtain an overview of connections (links between people) and their communications.
Detect and counter various anti-forensics techniques, use carving to recover deleted data from a hard drive and perform memory forensics.
1.1. Practical case
1.2. Install Belkasoft Evidence Center X
1.3. Create a new case
1.4. Add a data source (E01 image)
2.1. Work with discovered artifacts
2.2. Analyze different types of devices
2.3. Use mini-timeline, global, and local filters
2.4. BelkaQUIZ (3)
2.5. Connection Graph (article)
2.6. Belkasoft Connection Graph (video)
2.7. BelkaQUIZ (2)
3.1. What Artifacts Can be Analyzed from a Windows System
3.2. Registry artifacts analysis
3.3. BelkaQUIZ (2)
3.4. Countering anti-forensics efforts
3.5. BelkaQUIZ (3)
3.6. How to analyze Windows 10 Timeline
3.7. BelkaQUIZ (2)
4.1. Сarving features in Belkasoft X
4.2. Carving and its implementation in digital forensics
4.3. BelkaQUIZ (2)
4.4. Discovering evidence with Live RAM analysis
4.5. BelkaQUIZ (2)
5.1. Using Timeline (article)
5.2. Video tutorial on Belkasoft Timeline
5.3. BelkaQUIZ (3)
5.4. Hashset analysis in Belkasoft X
5.5. Run hashset analysis
5.6. BelkaQUIZ (2)
The course is designed for those who need to acquire evidence remotely and would like to learn more about all the needed steps, such as configuring a server, deploying an agent, and various ways to acquire data.
$999
Learn how to analyze and review mobile artifacts in Belkasoft X, to narrow your search and quickly find the data you need, or how to choose the right method to acquire Android or iOS data.
$999
Grow with Belkasoft