Level: Certificate
Institute: Turnkey IT Training
Entry Requirement
Course Content
- Computer Forensics Investigation Process
- Computer Forensics Lab
- Understanding Hard Disks and File Systems
- Windows Forensics
- Data Acquisition and Duplication
- Recovering Deleted Files and Partitions
- Forensics Investigation Using AccessData FTK
- Forensics Investigation Using EnCase
- Stenography and Image File Forensics
- Application Password Crackers
- Log Capturing and Event Correlation
- Network Forensics, Investigating Logs and Investigating Network Traffic
- Investigating Wireless Attacks
- Tracking & Investigating Email Crimes
- Mobile Forensics
Inquire Now
Student Reviews
Share your thoughts
If you’ve follow this course, share your thoughts with other students.
Login to Write a reviewWrite your review
Please make sure the review is genuine and related to the course.
Related Courses
-
Developing ASP.NET Core MVC Web Applications
IT | Information Technology (IT)
Certificate
InnoventSys
-
Certificate IV in Information Technology (Web Development)
IT | Information Technology (IT)
Certificate
VLT Campus
-
Linux Basic Course
IT | Computer Networking
Certificate
Vibernets Academy
-
CCNP SWITCH
IT | Computer Networking
Certificate
Vibernets Academy
-
CCNP ROUTE
IT | Computer Networking
Certificate
Vibernets Academy
-
Web Engineering
IT | Software Engineering
Certificate
AICT
-
Mastering Microsoft Project 2016
IT | Information Technology (IT)
Certificate
InnoventSys
-
AZ-304 – Microsoft Azure Architect Design
IT | Information Technology (IT)
Certificate
InnoventSys
-
MS-203 – Microsoft 365 Messaging
IT | Information Technology (IT)
Certificate
InnoventSys
-
MS-600 – Building Applications and Solutions with Microsoft 365 Core Services
IT | Information Technology (IT)
Certificate
InnoventSys