Course Outline
At the end of this course you will be able to demonstrate knowledge and understanding of:
- Forensics Investigation Process
- Use Guidance Encase and FTK Access Data
- Cryptography, Steganography, Media Files Forensic techniques
- Password Cracking
- Investigating Wireless Attacks
- Investigating Web Applications Attacks
- Investigating Web Servers Attacks
- Investigating Database Servers Attacks
- Investigating Email Crimes
- Investigating Mobile Applications Crimes
Requirements
Work experience in an IT or IT-related role
Attend Digital Forensic Investigation - Introduction
Testimonials (5)
Accessing tools and being able to ask questions to someone friendly who I felt wouldn't judge me
Kiara
Course - Open Source Cyber Intelligence - Introduction
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Emin was really engaging and enthusiastic, his knowledge succeeded expectations and allowed for questions at each portion.
Becky
Course - OSINT Practitioner Course (Advanced OSINT)
The Burpe suite i need more training in this
Gontse Ntshegi - Vodacom
Course - Android Security
Lot's of information explained very well. Good examples, interesting exercises. Trainer showed us his real world experience.