Computer Forensics Investigation Process
0Searching and Seizing Computers
Digital Evidence05. First Responder Procedures
Computer Forensics Lab
Understanding Hard Disks and File Systems
Windows Forensics
Data Acquisition and Duplication
Recovering Deleted Files and Deleted Partitions
Forensics Investigation using Access Data FTK
Forensics Investigation Using Encase
Steganography and Image File Forensics
Application Password Crackers
Log Capturing and Event Correlation
Network Forensics, Investigating Logs and Investigating Network Traffic
Investigating Wireless Attacks
Investigating Web Attacks
Tracking Emails and investigating Email Crimes
Mobile Forensics
Investigative Reports
Becoming an Expert Witness