Course Outline
At the end of this course you will be able to demonstrate knowledge and understanding of:
- Forensics Investigation Process
- Use Guidance Encase and FTK Access Data
- Cryptography, Steganography, Media Files Forensic techniques
- Password Cracking
- Investigating Wireless Attacks
- Investigating Web Applications Attacks
- Investigating Web Servers Attacks
- Investigating Database Servers Attacks
- Investigating Email Crimes
- Investigating Mobile Applications Crimes
Requirements
Work experience in an IT or IT-related role
Attend Digital Forensic Investigation - Introduction
Testimonials (5)
The trainer was very knowledgable and took time to give a very good insight into cyber security issues. A lot of these examples could be used or modified for our learners and create some very engaging lesson activities.
Jenna - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
All is satisfy
Motaz Abdallat - شركة الشرق الأدنى للتواصل الإجتماعي
Course - Open Source Intelligence (OSINT) Advanced
Questions, that helps me a lot to understand the characteristics of CRISC examination.
Masakazu Yoshijima - Bank of Yokohama, Ltd.
Course - CRISC - Certified in Risk and Information Systems Control
Piotr was incredibly knowledgeable and very patient. He was great at explaining things and I'd strongly recommend this course to others
Victoria Harper
Course - Open Source Cyber Intelligence - Introduction
Instructor delivery of information; At the end of the day it was Gaurav who pulled off this topic focusing on building strong fundamentals and devising a methodology to be retained with us