Back to all modules

Windows Endpoint Investigation

Windows Endpoint Investigation icon

Understand various aspects of Windows forensics and learn how to investigate the footprints of an attack on the Windows Endpoint.

In this module, we will explore various aspects of Windows Forensics and how different components within Windows store information about the user activity and system configuration that could help us during a digital investigation. You will learn about file systems, registry changes, and network activity generated from user activity. At the end of this module, you will be comfortable performing digital forensics on Windows Endpoints.

Windows Endpoint Investigation icon

What are modules?

A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).

Module tree diagram

We use cookies to ensure you get the best user experience. For more information contact us.

Read more