Introduction to Windows Forensics

Learn the investigative skills and forensic foundations you need to examine Windows systems, uncover what happened, and build cases that hold up.

Training for a team or organization? Contact us about group access.

SOC 201

Inside the Course

Scroll down to explore the skills you’ll build, the techniques you’ll master, and the requirements to get started.

Start Learning This Course Today

The All-Access Membership gives you unlimited access to this course, hands-on labs, and a complete library of cybersecurity training. Everything you need to build real-world skills is included.

Questions?

If you need clarification on the course or its requirements, simply use the chat button below and our team will assist you.

  • Difficulty: Beginner
  • Duration: 7.5h
  • Access: Included in Membership

Overview

Windows systems run enterprises, governments, and critical infrastructure around the world. When something goes wrong, organizations need examiners who can find out what happened, how it happened, and who was responsible.

Introduction to Windows Forensics gives you that foundation. You will learn how Windows systems generate persistent evidence through file structures, registry hives, event logs, caches, and application traces, and how each contributes to reconstructing user actions or malicious activity. You will also build the core investigative habits that every good analyst needs: maintaining forensic integrity, validating sources, following a consistent methodology, and approaching every case with a hypothesis in mind.

This is the first course of the Windows Forensics Learning Path. It assumes no prior forensic experience and is designed as a prerequisite for intermediate/advanced courses that are arriving later this year.

Key Topics

  • The Investigative Mindset
  • The Digital Forensic Process
  • Foundational Principals
  • Understanding How Data Is Stored
  • Sources of Digital Evidence
  • The Windows Operating System
  • DFIR Software and Hardware
  • Evidence Acquisition

Objectives

Understand the Windows Forensics Discipline:

  • Explain what Windows forensics is and how it fits within cybersecurity operations and incident response
  • Identify the key artifact categories examiners use when reconstructing system activity

Develop a Sound Investigative Methodology:

  • Approach investigations with a hypothesis-driven mindset and a consistent, repeatable process
  • Apply foundational principles including forensic integrity, source validation, and proper evidence handling

Acquire and Preserve Digital Evidence:

  • Select appropriate DFIR hardware and software tools for a given investigative scenario
  • Perform evidence acquisition using proper imaging and hashing techniques

System Requirements

  • Computer capable of running a Windows 11 virtual machine
  • Recommended: 16 GB RAM, modern multi-core CPU, ~100 GB free disk space
  • Virtualization software: VMware Workstation Player, VirtualBox, or Hyper-V
  • Note for Apple Silicon users (M1/M2/M3/M4): This course is built around x86/x64 Windows tooling. Apple Silicon Macs run ARM and rely on emulation (via Parallels or VMware Fusion with Windows 11 ARM) to run the lab environment, which can introduce compatibility issues with some forensic tools. An x86/x64 Windows or Linux host is strongly recommended.

Prerequisites

  • Basic computer literacy and comfort working in Windows
  • Familiarity with the Windows command line or PowerShell
  • No prior digital forensics experience required. The course is built for aspiring DFIR analysts, SOC analysts, IT professionals moving into security, and career-changers entering the field.
  • Familiarity with running a virtual machine

Recommended For

Introduction to Windows Forensics is built for anyone who wants to develop practical, job-ready forensics skills on Windows systems. Whether you are new to DFIR or expanding your existing security skillset, you will leave with the foundational knowledge needed to start examining systems with confidence.

This course is well-suited for:

  • Aspiring DFIR analysts
  • SOC analysts looking to expand their skill set
  • IT professionals moving into security
  • Cybersecurity students and career changers looking to build their skills

Course Curriculum

  • Course Introduction
    • Lab Setup
  • The Investigative Mindset
    • What is Digital Forensics?
    • Digital Forensics and Incident Response (DFIR)
    • Roles in DFIR
    • The Investigative Mindset
    • The Iterative Investigation Loop
    • Telling the Story
    • Ethics and Objectivity
    • Scope, Authorization, and Handling Sensitive Material
    • Corroboration and Proving Knowledge
    • Professional Discipline
    • Your First Investigation
    • Quiz
  • The Digital Forensic Process
    • The Digital Forensic Process
    • System Preservation
    • Live and Dead Forensics
    • Evidence Searching
    • Keyword Searching with Autopsy
    • The PICL Guidelines
    • Event Reconstruction
    • The Incident Response Lifecycle
    • Quiz
  • Foundational Principals
    • Hashing & Integrity Verification
    • Maintaining Chain of Custody
    • Quiz
  • Understanding How Data is Stored
    • Exploring Data at the Hex Level
    • Quiz
  • Sources of Digital Evidence
    • Endpoint Devices
    • VMs, Mobile, and Peripherals
    • RAM, Network, and Cloud Evidence
    • Emerging Evidence Sources
    • Quiz
  • The Windows Operating System
    • Windows Artifact Hunting
    • Quiz
  • DFIR Software and Hardware
    • Setting Up Your Forensic Workstation
    • Quiz
  • Evidence Acquisition
    • Acquiring a Memory Image
    • Checking for Encryption
    • Acquiring a Forensic Image
    • Quiz
    Conclusion
    • Course Wrap Up

    This Course Is Included in Your All-Access Membership

    One membership gives you ongoing access to Introduction to Windows Forensics, every other paid Academy course, and an active community of learners and mentors in Discord.

    INSTRUCTORS

    Meet Your Instructor

    Learn from industry experts with real-world cybersecurity experience.

    Andrew Prince

    Andrew Prince

    Andrew is a seasoned and passionate security professional who brings a wealth of experience in areas such as security operations, incident response, threat hunting, vulnerability management, and cloud infrastructure security.

    With a professional background in development and system administration, Andrew offers a well-rounded perspective on his security strategy. Andrew also navigates both offensive and defensive operations to provide a holistic approach to keeping people, processes, and technology secure. He is also active in developing various Capture the Flag challenges, creating security training, and sharing knowledge through content creation.

    FAQS

    Common Questions

    Here are a couple of our most commonly asked questions, contact us if you don’t find an answer!

    Can I get a refund if I'm unhappy with my purchase?
    2
    3

    Yes. All courses come with a 24-hour money-back guarantee.

    Will I receive a certificate of completion when I finish a course?
    2
    3

    Yes. All courses come with a certificate of completion.

    Do the courses count as Continuing Education Units (CEUs)?
    2
    3

    Yes. Every certificate of completion comes with the total CEUs earned listed on the certificate.

    What is the All-Access Membership?
    2
    3

    As of July 1st, 2023 TCM Academy transitioned to a monthly subscription model, where you now receive full access to all of the courses on our platform for as long as your subscription remains active.

    What if you already own courses on TCM Academy?
    2
    3

    If you already own a course on our platform, you will continue to own that course. Previously owned courses will not be affected by this change.

    I can see the course, but it won’t load or play. What should I do?
    2
    3

    We use Cloudflare to protect our course platform and unfortunately, it does not play nice with VPNs. If you are experiencing issues, turn off your VPN and try again. If that does not solve the issue, please contact our support team at support@tcm-sec.com and we will help you out.

    This course is included in our All-Access Membership, starting at $29.99/month.

    Get full access to this course and our full course catalog when you enroll in our All-Access Membership.

    Ready to level up your Cybersecurity Career?

    Get unlimited access to every TCM Security Academy course, hands-on lab, and certification pathway with an All-Access Membership. Learn at your own pace, build real-world skills, and take the next step toward a career in cybersecurity.

    PWPA