CHAPTER 7
Windows Forensics
After completing this chapter, you should be able to
• Define volatile and nonvolatile information and describe techniques for collecting nonvolatile information, including cache, cookie, and history analysis
• Discuss various forensic tools and how to search with the Microsoft Event Viewer
• Explain various processes involved in forensic investigation of a Windows system, such as memory and registry analysis, Internet Explorer cache analysis, cookie analysis, MD5 calculation, Windows file analysis, and metadata investigation
• Explain how to parse process memory and a memory dump, and how to analyze restore point registry settings
• Discuss Windows password security issues, ...
Get CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.