Hacking Forensics Computer Investigator
Course
Online
Description
-
Type
Course
-
Level
Intermediate
-
Methodology
Online
-
Duration
12 Months
-
Start date
Different dates available
-
Online campus
Yes
-
Delivery of study materials
Yes
-
Support service
Yes
-
Virtual classes
Yes
Completion Certificate awarded upon completion to show employers your new skills
Free upgrade on to our state of the art platform
Career Advice available on completion
12 Months unlimited Access
Hacking Forensics Computer Investigator
Computer crime in today’s cyber world is on the rise in a dramatic way. Computer Investigation techniques have become widespread and are now being utilized by government, Fortune 100 companies, law enforcement and candidly any organization that is concerned about the security of their infrastructure.
This course follows up on the skills gained within the Hacking Forensics course and then moves towards the area of digital forensics and computer crimes.
The course goes past just the use of hacking tools, techniques and methodologies and instead covers the skills needed for hacker identification and prosecution through foot-printing techniques. A few of the topics included in this course are:
Create forensic boot diskettes
Create and verify forensically sterile examination media
Understand forensic reporting
Convert data formats
Find and recover deleted, formatted, hidden, and lost data
Make forensic copies of digital media
Facilities
Location
Start date
Start date
About this course
Our training works on all devices including Mobile phones, IPad’s, Android tablets, Macs and PC’s.
Reviews
Subjects
- Access
- Hacking
- Media
- Forensics
- Evidence
- Forensic
- Procedures
- Acquisition
- Duplication
- Partitions
- Recovering
Course programme
- Intro to Course
- Intro to Forensics
- Forensics Investigation Process
- Searching and Seizing
- Digital Evidence
- First Responder Procedures
- Forensic Lab
- Hard Disks and File Systems
- Windows Forensics
- Data Acquisition and Duplication
- Recovering Deleted Files and Partitions
- Using Access Data FTK and Special Steps
- EnCase
- Stenography
- Passwords
- Log Correlation
- Network Forensics
- Wireless Attacks
- Web Attacks
- Email Crimes
- Mobile Investigation
- Investigation Reports
- Expert Witness
Hacking Forensics Computer Investigator