![](https://static.wixstatic.com/media/11062b_61151d0087ad418fa801687a88c78716~mv2.jpg/v1/fill/w_1920,h_1323,al_c,q_90,usm_0.66_1.00_0.01,enc_avif,quality_auto/11062b_61151d0087ad418fa801687a88c78716~mv2.jpg)
![](https://static.wixstatic.com/media/5fb032_d5898e7459ef4382af47f864d5787dd7~mv2.png/v1/fill/w_353,h_174,al_c,q_85,enc_auto/5fb032_d5898e7459ef4382af47f864d5787dd7~mv2.png)
NTFS Journaling(Different Artifact like $I30, $MFT, $LogFile, $UsnJrnl)
Pages Count
8 Pages
Links for the courses
NTFS Journaling in Forensics $LogFile, $UsnJrnl    : Click Me
$LogFile, $UsnJrnl:- Parsing of $J || $Logfile using MFTECmd.exe        : Click Me
$LogFile, $UsnJrnl :- Analyzing of $J || $LogFile using Timeline explorer : Click Me
NTFS Common Activity Patterns in the Journals $LogFile,$UsnJrnl     : Click Me
Collecting, Parsing, Analyzing the $MFTÂ Â Â Â Â Â Â Â Â Â Â Â : Click Me
Understanding, Collecting, Parsing the $I30Â Â Â Â Â Â Â Â Â : Click Me
​
------------------------------------------------------------------------------------------------------------
Tracing Reused $MFT Entries Paths : Recovering Deleted File Paths Forensically with CyberCX UsnJrnl Rewind : Click Me
------------------------------------------------------------------------------------------------------------
         Overview of NTFS File System: Click Me
Your Instructor
Dean
![Dean](https://static.wixstatic.com/media/5fb032_3db91b1fff95466183c4e25d0c5a3d22~mv2.jpg/v1/fill/w_110,h_153,al_c,q_80,usm_0.66_1.00_0.01,enc_avif,quality_auto/Image-empty-state.jpg)