top of page
![](https://static.wixstatic.com/media/11062b_61151d0087ad418fa801687a88c78716~mv2.jpg/v1/fill/w_1920,h_1323,al_c,q_90,usm_0.66_1.00_0.01,enc_avif,quality_auto/11062b_61151d0087ad418fa801687a88c78716~mv2.jpg)
![](https://static.wixstatic.com/media/11062b_5b6f3911c52d4e56a1a6e03981ef1021~mv2.jpg/v1/fill/w_980,h_1470,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/11062b_5b6f3911c52d4e56a1a6e03981ef1021~mv2.jpg)
Forensic/Investigation Related Useful Blogs
Pages Count
8 Pages
Links for the courses
Extracting/Examine VSS Copies for Forensic       : Click Me
Techniques for Data Recovery and Analysis       : Click Me
File Origins: The Role of Alternate Data Streams (ADS)/(Zone.Identifier) in Forensic Investigations   : Click Me
(SSDs): Acquisition, Analysis, and Best Practices   : Click Me
Before Memory Acquisition and Disk Encryption    : Click Me
Detect Replication + Mimikatz DC Sync          : Click Me
Windows Registry Control Sets, ControlSet001,002 :Click Me
Endianness and Its Importance in Forensic Analysis : Click Me
Your Instructor
Dean
![Dean](https://static.wixstatic.com/media/5fb032_3db91b1fff95466183c4e25d0c5a3d22~mv2.jpg/v1/fill/w_110,h_153,al_c,q_80,usm_0.66_1.00_0.01,enc_avif,quality_auto/Image-empty-state.jpg)
bottom of page