Cybercriminals are using free and paid, convenient storage options, like Google Drive and Dropbox, to store
illegal files, and to launch malware attacks. Criminals can use sites to share malware infected files that can
compromise systems. The installed malware can be used to siphon data from computers. When examining a
local computer, the examiner has the best possible access to artifacts that may relate to cloud usage.
Forensic analysis on the system should center around; installed applications, temporary Internet files, web
cache, registry entries, and other artifacts.
This advanced two day course provides the knowledge and skills necessary to analyze the Microsoft
Windows operating system artifacts to locate user data and file system artifacts related to the usage of cloud
This class will introduce the students to:
Read and understand the English language.
Perform basic operations on a personal computer.
Have a basic knowledge of computer forensic investigations and acquisition procedures.
Be familiar with the Microsoft Windows environment.
Class Materials and Software
You will receive the student training manual containing the training material, lab exercises and class-related