Description
Price: 15.00 USD | Size: 10.5 GB | Duration : 13.58 Hours | 79 VideoLessons |
BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | 



4.9
Computer Forensics Learning Path
About Computer Forensics
This learning path is designed to build a foundation of knowledge and skills around computer forensics. As you progress through 13 courses, you’ll learn about conducting forensics on a variety of platforms and devices, including networks, file and operating systems, memory, email and browsers. Upon completion, you’ll have a base of computer forensics knowledge to carry over to your job or next project — and the skills necessary to conduct an investigation into potential computer crimes.
Syllabus
1. Computer Forensics as a Profession
1. Flex Computer Forensics as a Profession a
2. Flex Computer Forensics as a Profession b
3. Flex Computer Forensics as a Profession c
2. Digital Evidence and Legal Issues
1. Flex Digital Evidence and Legal Issues
2. Flex Digital Evidence and Legal Issues b
3. Flex Digital Evidence and Legal Issues c
4. Flex Digital Evidence and Legal Issues d
5. Flex Digital Evidence and Legal Issues e
6. Flex Digital Evidence and Legal Issues f
7. Flex Digital Evidence and Legal Issues g
8. Flex Digital Evidence and Legal Issues h
9. Flex Digital Evidence and Legal Issues i
10. Flex Digital Evidence and Legal Issues j
11. Flex Digital Evidence and Legal Issues k
3. Computer Forensic Investigations
1. Flex Investigations a
2. Flex Investigations b
3. Flex Investigations c
4. Flex Investigations d
5. Flex Investigations e
6. Flex Investigations f
7. Flex Investigations g
8. Flex Investigations h
9. Flex Investigations i
10. Flex Investigations j
11. Flex Investigations k
12. Flex Investigations l
13. Flex Investigations m
14. Flex Computer Forensics Tools and Hardware
4. Aspects of Hard Drives
1. Flex Aspects of Hard Drives a
2. Flex Aspects of Hard Drives b
3. Flex Aspects of Hard Drives c
4. Flex Aspects of Hard Drives c
5. File Systems
1. Flex File Systems a
2. Flex File Systems b
3. Flex File Systems c
4. Flex File Systems d
6. File and Operating System Forensics
1. Flex File and Operating System Forensics a
2. Flex File and Operating System Forensics b
3. Flex File and Operating System Forensics c
4. Flex File and Operating System Forensics d
5. Flex File and Operating System Forensics e
6. Flex File and Operating System Forensics f
7. Flex File and Operating System Forensics g
8. Flex Viruses and Malware
7. Email and Browser Forensics
1. Flex Email and Browser Forensics a
2. Flex Email and Browser Forensics b
3. Flex Email and Browser Forensics c
4. Flex Email and Browser Forensics d
5. Flex Email and Browser Forensics e
6. Flex Email and Browser Forensics f
7. Flex Email and Browser Forensics g
8. Flex Email and Browser Forensics h
9. Flex Email and Browser Forensics i
10. Flex Email and Browser Forensics j
11. Flex OWASP Top Ten
8. Network Forensics Concepts
1. Flex Network Forensics a
2. Flex Network Forensics b
3. Flex Network Forensics c
4. Flex Network Forensics d
5. Flex Network Forensics e
9. Memory Forensics
1. Flex Memory Forensics
10. Data Hiding
1. Flex Cryptographic Hashing a
2. Flex Cryptographic Hashing b
3. Flex Cryptographic Hashing c
4. Flex Cryptographic Hashing d
11. Password and Encryption
1. Flex Cryptographic Hashing e
2. Flex Cryptographic Hashing f
3. Flex Cryptographic Hashing g
4. Flex Anti-Forensics
12. New and Emerging Technologies
1. Flex New and Emerging Technologies a
2. Flex New and Emerging Technologies b
3. Flex New and Emerging Technologies c
4. Flex New and Emerging Technologies d
5. Flex New and Emerging Technologies e
6. Flex New and Emerging Technologies f
13. Introduction to Mobile Forensics
1. Flex Mobile Forensics a
2. Flex Mobile Forensics b
3. Flex Mobile Forensics c
4. Flex Mobile Forensics d
Discover more from Expert Training
Subscribe to get the latest posts sent to your email.
Reviews
There are no reviews yet.