Deep dive of what we can do with Shell Items on windows
understanding how Registry works in windows and how to analyze it
understanding how Event logs work in windows and how to analyze them
Looking at how you can perform an investigation and detect malicious Emails
Looking at how Hard disks work and how to extend their investigation