Contents:
∆Computer Forensics Introduction
∆ Computer Forensics Process
∆ Searching and Seizing
∆ Digital Evidence
∆ First Responder Procedures
∆ Forensics Lab
∆ Hard Disk and File Systems
∆ Windows Forensics
∆ Data Acquition and duplication
∆ Recovering Deleted Files and Partitions
∆ Using Access Data FTK
∆ Using Encase
∆ Password crackers
∆ Log Correction
∆ Network Forensics
∆ Wireless Attack
∆ Web Attacks
∆ Email Crimes
∆ Mobile investigation
∆ Investigative Report
∆ Expert Witness
CLICK HERE TO FOLLOW ME
∆Computer Forensics Introduction
∆ Computer Forensics Process
∆ Searching and Seizing
∆ Digital Evidence
∆ First Responder Procedures
∆ Forensics Lab
∆ Hard Disk and File Systems
∆ Windows Forensics
∆ Data Acquition and duplication
∆ Recovering Deleted Files and Partitions
∆ Using Access Data FTK
∆ Using Encase
∆ Password crackers
∆ Log Correction
∆ Network Forensics
∆ Wireless Attack
∆ Web Attacks
∆ Email Crimes
∆ Mobile investigation
∆ Investigative Report
∆ Expert Witness
CLICK HERE TO FOLLOW ME