Level: Certificate
Institute: Turnkey IT Training
Entry Requirement
Course Content
- Computer Forensics Investigation Process
- Computer Forensics Lab
- Understanding Hard Disks and File Systems
- Windows Forensics
- Data Acquisition and Duplication
- Recovering Deleted Files and Partitions
- Forensics Investigation Using AccessData FTK
- Forensics Investigation Using EnCase
- Stenography and Image File Forensics
- Application Password Crackers
- Log Capturing and Event Correlation
- Network Forensics, Investigating Logs and Investigating Network Traffic
- Investigating Wireless Attacks
- Tracking & Investigating Email Crimes
- Mobile Forensics
Inquire Now
Student Reviews
Share your thoughts
If you’ve follow this course, share your thoughts with other students.
Login to Write a reviewWrite your review
Please make sure the review is genuine and related to the course.
Related Courses
-
Developing SQL Data Models
IT | Information Technology (IT)
Certificate
InnoventSys
-
ITIL 4 Foundation
IT | Information Technology (IT)
Certificate
InnoventSys
-
CISSP – Certified Information Systems Security Professional
IT | Information Systems
Certificate
InnoventSys
-
QA – Software Testing
IT | Software Testing
Certificate
InnoventSys
-
Software Test Automation with Selenium
IT | Software Testing
Certificate
InnoventSys
-
ICAD – iOS Certified Associate Developer
IT | Software Engineering
Certificate
InnoventSys
-
ACAD – Android Certified Associate Developer
IT | Software Engineering
Certificate
InnoventSys
-
AWS Certified Developer – Associate
IT
Certificate
InnoventSys
-
AWS Certified Solutions Architect- Associate
IT
Certificate
InnoventSys