Course Outline
At the end of this course you will be able to demonstrate knowledge and understanding of:
- Forensics Investigation Process
- Use Guidance Encase and FTK Access Data
- Cryptography, Steganography, Media Files Forensic techniques
- Password Cracking
- Investigating Wireless Attacks
- Investigating Web Applications Attacks
- Investigating Web Servers Attacks
- Investigating Database Servers Attacks
- Investigating Email Crimes
- Investigating Mobile Applications Crimes
Requirements
Work experience in an IT or IT-related role
Attend Digital Forensic Investigation - Introduction
Testimonials (9)
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Lap Qradar
Sutthikan Noisombat - NTT
Course - IBM Qradar SIEM: Beginner to Advanced
Accessing tools and being able to ask questions to someone friendly who I felt wouldn't judge me
Kiara
Course - Open Source Cyber Intelligence - Introduction
The simple explanation of the trainer
Mohammed salem - Palestinian Police
Course - Open Source Intelligence (OSINT) Advanced
Very good knowledge and character.
Constantinos Michael
Course - Java and Web Application Security
Pushing changes on an ongoing basis, when on the 3rd day I started to get more lost than before and it was harder to spot the error quickly, I was quickly able to check out the latest changes and stay up to date with the material
Paulina
Course - Advanced Java Security
Machine Translated
Very good to understand how a hacker would potentially analyse sites for weakness and tools they might employ .
Roger - OTT Mobile
Course - .NET, C# and ASP.NET Security Development
Beginning by how to hack to better understand how to secure was very interesting and appreciated.
Raphaël Capocasale - Mikron SA Boudry
Course - Advanced C#, ASP.NET and Web Application Security
Web 的同源策略和跨域的内容,以及XSS 的危害,這個很貼切我們的工作。