
Data Storage Foundations
4 Days – 32Hrs
Cost: $2,595
Participants will receive
4-Days of Instruction
Course Manual
Practical Files
Attendance Certificate

Rob Attoe
Lead Developer
Rob is the CEO and Founder of Spyder Forensics. He has over two decades of experience developing and presenting training on Digital Forensics, Cyber Security, Mobile Forensics, and eDiscovery education programs for the global digital investigations community.
As a lifetime member of the International Association of Computer Investigative Specialists (IACIS), Rob instructs regularly at the association’s annual conferences and is a lead instructor for several advanced courses as well as regularly presenting at the premier international digital forensics conferences. Rob has contributed to digital forensic publications and is a subject matter expert in various courses for the ATA program managed by the State Department in the USA.
Course Objectives
This four-day course is designed for the examiner tasked with the recovery and analysis of data collected from electronic evidence. Early modules examine techniques in the recovery of volatile data (RAM) including basic analysis techniques and a review of file system fundamentals.
This will be followed by an in-depth analysis of the architecture and functionality of the Microsoft New Technology File System (NTFS), and the exFAT file systems, including the detailed examination of related directory entry information for locating files on electronic media. Attendees will gain insights into the effects of the formatting process and how the system areas function as well as file data management and directory entry metadata pertaining to the stored data. All forensically relevant areas will be examined in detail as well as techniques for identifying potential evidence that may be pivotal to a successful advanced examination.
These topics will be followed by a more in-depth analysis of forensic artifacts within a modern Windows environment that includes advanced Windows Registry examination, introduction to SQLite databases, and recovery of deleted files for the examination of artifacts aligned to user activity.
Students will apply this new knowledge to artifacts located on Windows-based systems where there will be a direct correlation between the File System and Operating System \ Application functions such as Distributed Link Tracking services, Windows 10 Timeline function, and other Operating System-related artifacts.
Students will use a variety of open-source and leading forensic applications to examine key artifacts through multiple hands-on labs and student exercises.
Primary Learning Objectives
Data Storage Foundations - Day 1
Day 1 of the Spyder Forensics Data Storage Foundations course begins with an overview of the course along with an introduction to the Instructor.
We will then examine how data is collected and how it is best preserved and verified using industry recognized practices. We will then proceed to look at the Data Structures of NTFS so that we can understand how this will aid in locating and recovering evidence.
- Review of Digital Evidence collection principles
- Advanced Imaging techniques using CAINE
- Learn of the importance of imaging RAM
- Introduction to RAM Analysis using RegEx and PowerShell.
Instructor Led Lab
This lab focuses on the collection of digital evidence, providing participants with foundational best practices. Attendees will explore advanced imaging techniques using the CAINE (Computer Aided INvestigative Environment) tool for efficient digital extractions. A key discussion will cover the significance of imaging Random Access Memory (RAM), which can yield vital information about active processes and system states during investigations. The lab also introduces RAM analysis using regular expressions (RegEx) and PowerShell, enabling effective interpretation of memory data. By engaging in both theoretical concepts and hands-on exercises, participants will enhance their competencies in digital forensics, equipping them to handle real-world scenarios effectively. This comprehensive lab aims to enrich the knowledge and practical skills of those aspiring to excel in digital forensic investigations.
Instructor Led Lab
In this lab, participants will explore various aspects of the NT operating system’s file system support. The session will start with an overview of the file system capabilities for each NT version, followed by insights into NTFS metadata files and their crucial roles in the file system architecture. Each metadata file’s function will be explained, emphasizing its importance for system integrity and performance. The lab will also cover file record entries, their structure, and significance, as well as NTFS attributes that store essential information about files and directories. Additionally, participants will analyze the B+ tree structure in NTFS directories to understand its role in enhancing file retrieval efficiency. Finally, the instructor will discuss the implications of file deletion on data retrieval and integrity, ensuring participants grasp its lasting effects. This lab aims to provide learners with a deep understanding of NTFS mechanics for practical applications in data management and recovery.
- List file system support for each NT operating system
- Identify NTFS Metadata Files
- List the function of each Metadata file
- Describe a File Record Entry
- List the components of an NTFS Attribute
- Examine the B+ Tree structure of directories
- Describe the effects of data when a file is deleted.
Data Storage Foundations - Day 2
During day 2 of the course we will begin to look at file permissions associated with NTFS and discuss why they are such an important weapon in any forensic investugation.
Alongside this we will explore EFS (Encrypting File System) which is built into the NTFS file system.
- Describe NT Rights and Permissions
- Describe the structure of a Security Descriptor
- Object ID’s
- System Access Control List
- Discretionary Access Control List
- Access Control Entries
- Identify Permissions for NT Objects
Instructor Demonstration
This lab focuses on NT Rights and Permissions, providing a comprehensive understanding of system security measures. Participants will explore Security Descriptors, which manage security settings on NT objects, and the significance of Object Identifiers (Object IDs) in uniquely identifying network resources. The lab will examine the System Access Control List (SACL) and Discretionary Access Control List (DACL), both critical for defining user and group access permissions. Emphasizing Access Control Entries (ACEs) that grant or deny access rights, the session will engage participants in identifying permissions associated with various NT objects.
Instructor Led Lab
In this instructor-led lab, students will investigate the processes associated with the Encrypting File System (EFS) and learn how to effectively examine artifacts located within the data-hosting clusters. Participants will gain insights into recognizing the keys and users authorized to decrypt the encrypted data, enhancing their understanding of EFS-related forensic analysis. Through hands-on exercises, learners will practice identifying and extracting relevant artifacts, equipping them with the skills needed to navigate EFS data effectively during investigations.
- Describe the EFS Encryption process
- Identify encrypted files and users that can decrypt
- Describe strategies for decrypting EFS encrypted files
Data Storage Foundations - Day 3
Day 3 of the course looks at the exFAT file system which will enable us to understand the rules of the an exFAT volume and why this in important to the forensic examiner when recovering evidence.
Alongside this we will also look at different core system functions and how we can utilize them to track user activity.
- Describe the history of exFAT
- Identify the system areas of the volume
- Breakdown the Volume Boot Record
- File Allocation Table
- Describe the function of Bitmap
- Breakdown a directory entry
- Describe the effects of data when a file is deleted and review recovery techniques.
Instructor Led Lab
In this lab, participants will explore the exFAT file system, starting with its historical context and evolution as a solution for flash storage compatibility across multiple operating systems. The session will cover the system areas of the exFAT volume, the components and significance of the Volume Boot Record, and the role of the File Allocation Table (FAT) in managing disk space. Participants will learn about the Bitmap’s functionality for representing free and allocated clusters, as well as the structure of directory entries for file access. Finally, the lab will address file deletion implications on data integrity and recovery techniques, providing attendees with practical knowledge for managing deleted files effectively.
Instructor Led Lab
In this lab, participants will examine the Windows Search Database, focusing on its structure and forensic artifacts from table data. The session will also cover Windows Backup options, reviewing various strategies for data recovery. Participants will learn to use forensic tools effectively to rxtract the data. Additionally, the lab will include extracting data from Shadowcopy stores which may contain historical versions of file data. Through hands-on exercises, attendees will gain practical experience in accessing hidden data structures. By the end of the module, participants will have a solid understanding of these Windows features, enhancing their data management and recovery skills within the operating environment.
- Examination of the Windows Search Database
- Explore Windows Backup options and analysis
- Extraction of data in ShadowCopy store
Data Storage Foundations - Day 4
On day 4 of the course we will bring all of the learnt knowledge together and also look at the Windows Registry and understsnd the forensic benefits of examining the Registry.
We will also look at the artifacts left behind when a user interacts with the host system.
Finally we will look at the artifacts found on the system after usser interaction with the Chromium based Edge browser.
- Define the Windows Registry
- Review the forensic benefits of examining the Registry
- Introduction to the recovery of evidentially relevant data from deleted cells within a registry file
- Analysis of recorded user activity across multiple registry files
Instructor Led Lab
This instructor-led lab focuses on the Windows Registry, a critical component of the operating system that stores configuration settings and options. Participants will begin by reviewing the Windows Registry block structure, gaining a foundational understanding of its cells and storage mechanisms. The session will then delve into the forensic benefits of examining the Registry, highlighting its role in digital investigations, such as uncovering user activity, system configurations, and potential evidence in legal cases.
Instructor Led Lab
In this lab, participants will explore key artifacts left behind through user interaction with files and folders, starting with essential shortcuts to boost productivity. The lab will cover advanced link file tracking, detailing how Windows records user interactions with files at the file system level. Participants will also analyze Windows Jump Lists for quick access to recent files and applications, alongside a practical Jump List analysis. Additionally, the lab will introduce Windows 10 Timeline functions for viewing historical user activities across devices and include an exploration of SQLite analysis for examining lightweight database data.
- Review Windows Shortcuts
- Explore advanced Link File tracking processes
- Review of Windows Jump Lists
- Perform Jump List Analysis
- Introduction into Windows 10 Timeline functions and SQLite database analysis
- Review Chromium-based browsers
- Locate key folders of interest within the user profile
- Learn of the new data storage files and their interpretation
using SQLite Scripting techniques
Instructor Led Lab
In this hands-on lab, participants will explore Chromium-based browsers, such as Google Chrome and Microsoft Edge, focusing on their architecture and data management. The labs will cover how to locate key folders within user profiles that are essential for forensic investigations, including browsing history, cache files, cookies, and saved passwords. Additionally, attendees will learn about new data storage files introduced in recent browser updates, emphasizing their significance and interpretation. Through practical exercises, participants will gain the skills to analyze these files and extract meaningful information from user interactions, ultimately enhancing their proficiency in chromium forensic anaoysis.