Level: Certificate
Institute: Turnkey IT Training
Entry Requirement
Course Content
- Computer Forensics Investigation Process
- Computer Forensics Lab
- Understanding Hard Disks and File Systems
- Windows Forensics
- Data Acquisition and Duplication
- Recovering Deleted Files and Partitions
- Forensics Investigation Using AccessData FTK
- Forensics Investigation Using EnCase
- Stenography and Image File Forensics
- Application Password Crackers
- Log Capturing and Event Correlation
- Network Forensics, Investigating Logs and Investigating Network Traffic
- Investigating Wireless Attacks
- Tracking & Investigating Email Crimes
- Mobile Forensics
Inquire Now
Student Reviews
Share your thoughts
If you’ve follow this course, share your thoughts with other students.
Login to Write a reviewWrite your review
Please make sure the review is genuine and related to the course.
Related Courses
-
CFA - Check Point Firewall Administration
IT
Certificate
Softwise Learnings
-
Microsoft Office Training
IT | Training
Certificate
Softwise Learnings
-
Cisco Certified Internetwork Expert
IT | Computer Networking
Certificate
Great Lake Cisco Training Center
-
Android application development with java
IT | Software Engineering
Certificate
Pragmatic Test Labs
-
Java Programming Basic
IT | Software Engineering
Certificate
Pragmatic Test Labs
-
PlanIT and PTL Certified Test Manager
IT | Software Engineering
Certificate
Pragmatic Test Labs
-
PlanIT and PTL Certified Test Team Lead
IT | Software Engineering
Certificate
Pragmatic Test Labs
-
PlanIT and PTL Certified Risk Based Tester
IT | Software Engineering
Certificate
Pragmatic Test Labs
-
PlanIT and PTL Certified e-Business Tester
IT | Software Engineering
Certificate
Pragmatic Test Labs
-
PlanIT and PTL Certified UAT Testing
IT | Software Engineering
Certificate
Pragmatic Test Labs