After reading this chapter, you should now have a basic understanding of the goal of digital forensic investigations. Much more could be said on each of these topics, and forensics is a specialty field that warrants its own book, much less a chapter.
Use the examples you have read as a starting place to think about what kind of information you would look for if you were presented a machine that had been compromised, and your goal was to figure out how the attacker got in, what time it happened, what they accessed, what they modified, what their motive was, how much data was exfiltrated, and anything else you can find to identify who the actor was or what actions were taken on the system.
A skilled adversary will make every attempt to cover their tracks and avoid forensic detection. For this reason, it is important to stay up to date on the latest tools and trends being...