- 1 year
- Intermediate
- Course Certificate
- Number of Units25
- Number of Quizzes0
- 14 hours, 9 minutes Gift this course
Course Curriculum
Overview | |||
Overview | 00:35:00 | ||
Reconnaissance | |||
Reconnaissance | 00:25:00 | ||
Protocols | |||
Protocols | 01:25:00 | ||
Windows Hacking | |||
Windows Hacking | 01:19:00 | ||
Attacking Web Technologies | |||
Attacking Web Technologies | 00:56:00 | ||
Pen Testing Wireless Networks | |||
Pen Testing Wireless Networks | 01:34:00 | ||
Forensic Investigation | |||
Introduction | 00:13:00 | ||
Computer Forensic Incidents | 00:28:00 | ||
Examination and Analysis | |||
Investigation Process | 00:54:00 | ||
Disk Storage Concepts | 00:30:00 | ||
Digital Acquisition & Analysis | 00:24:00 | ||
Protocols | |||
Forensic Examination Protocols | 00:25:00 | ||
Digital Evidence Protocols | 00:21:00 | ||
CFI Theory | 00:25:00 | ||
Digital Evidence | |||
Digital Evidence Presentation | 00:22:00 | ||
Computer Forensic Laboratory Protocols | 00:33:00 | ||
Computer Forensic Processing | 00:22:00 | ||
Digital Forensics Reporting | 00:20:00 | ||
Artifacts | |||
Specialized Artifact Recovery | 00:46:00 | ||
Discovery and ESI | 00:12:00 | ||
Other Forensics | |||
Cell Phone Forensics | 00:21:00 | ||
USB Forensics | 00:06:00 | ||
Incident Handling | |||
Incident Handling | 00:36:00 | ||
PDA Forensics | 00:23:00 | ||
Investigating Harassment | 00:14:00 |
Course Ratings
No Ratings found for this course.