Level: Certificate
Institute: Turnkey IT Training
Entry Requirement
Course Content
- Computer Forensics Investigation Process
- Computer Forensics Lab
- Understanding Hard Disks and File Systems
- Windows Forensics
- Data Acquisition and Duplication
- Recovering Deleted Files and Partitions
- Forensics Investigation Using AccessData FTK
- Forensics Investigation Using EnCase
- Stenography and Image File Forensics
- Application Password Crackers
- Log Capturing and Event Correlation
- Network Forensics, Investigating Logs and Investigating Network Traffic
- Investigating Wireless Attacks
- Tracking & Investigating Email Crimes
- Mobile Forensics
Inquire Now
Student Reviews
Share your thoughts
If you’ve follow this course, share your thoughts with other students.
Login to Write a reviewWrite your review
Please make sure the review is genuine and related to the course.
Related Courses
-
System Center 2012 Orchestrator
IT | Information Technology (IT)
Certificate
InnoventSys
-
Advanced Technologies of SharePoint 2016
IT | Information Technology (IT)
Certificate
InnoventSys
-
Programming in HTML5 with JavaScript and CSS3
IT | Information Technology (IT)
Certificate
InnoventSys
-
Programming in C#
IT | Information Technology (IT)
Certificate
InnoventSys
-
Developing ASP.NET Core MVC Web Applications
IT | Information Technology (IT)
Certificate
InnoventSys
-
Querying Data with Transact-SQL
IT | Information Technology (IT)
Certificate
InnoventSys
-
Developing SQL Databases
IT | Information Technology (IT)
Certificate
InnoventSys
-
Administering a SQL Database Infrastructure
IT | Information Technology (IT)
Certificate
InnoventSys
-
Provisioning SQL Databases
IT | Information Technology (IT)
Certificate
InnoventSys
-
Implementing a SQL Data Warehouse
IT | Information Technology (IT)
Certificate
InnoventSys