Cyber Security & Ethical Forensics

Product information

IT

Reviews

4 out of 5 stars

(no reviews)

Level: Certificate

Inquire Now

Entry Requirement

Course Content

  • Computer Forensics Investigation Process
  • Computer Forensics Lab
  • Understanding Hard Disks and File Systems
  • Windows Forensics
  • Data Acquisition and Duplication
  • Recovering Deleted Files and Partitions
  • Forensics Investigation Using AccessData FTK
  • Forensics Investigation Using EnCase
  • Stenography and Image File Forensics
  • Application Password Crackers
  • Log Capturing and Event Correlation
  • Network Forensics, Investigating Logs and Investigating Network Traffic
  • Investigating Wireless Attacks
  • Tracking & Investigating Email Crimes
  • Mobile Forensics

Inquire Now

Student Reviews

Share your thoughts

If you’ve follow this course, share your thoughts with other students.

Login to Write a review

Write your review

Please make sure the review is genuine and related to the course.