The Windows Forensics course teaches the techniques and tools to investigate and analyze digital evidence within Windows systems. It covers exploiting techniques and tools, storage, memory, registry, and log analysis. By the end of the course, students will be proficient in performing comprehensive forensic investigations and constructing detailed timelines of system events.

• Lead cybersecurity strategy at agency and national level
• Govern large-scale incident response and multi-agency crises
• Secure modern cloud and digital service platforms
• Embed security into digital product deliveries
• Prepare organisations for AI-driven and next-generation threats
The bootcamp combines executive briefings, case studies, interactive workshops, and hands-on cyber exercises delivered on CyberproAI’s Cympire Cyber Range, enabling leaders to experience real-world cyber crises in a controlled, immersive environment.
This course is designed for cybersecurity professionals, IT practitioners, and ethical hackers looking to deepen their expertise in web application security.
It’s ideal for those who already have a foundational knowledge of networking and security and want to advance their skills in identifying, exploiting, andmitigating web-based vulnerabilities. Whether you’re a penetration tester, security analyst, or IT manager, this course will provide practical tools and insights to help you defend against modern cyber threats targeting web applications.
This program is designed for IT professionals, cybersecurity analysts, digital forensics investigators, incident responders, and system administrators with a foundational understanding of IT systems, Windows operating systems, cybersecurity fundamentals, and forensic investigation techniques.
The ideal participants are those looking to deepen their expertise in forensic analysis, specifically in Windows environments. This course is precious for individuals in roles that involve investigating security incidents, recovering and analyzing digital evidence, or auditing Windows-based systems for potential breaches. It is well-suited for professionals working in mid to largesized organizations who are responsible for ensuring the integrity and security of Windows infrastructure and need to enhance their ability to uncover and respond to malicious activities within these systems.
• PowerShell
• Windows System
• CPU: Intel i5/i7 or AMD 5x/7x
• RAM: 16GB
• HDD: 300GB available space