The Computer Hacking Forensic Investigator course marks your entry into the intricate and compelling world of cybersecurity and digital forensics. This curriculum is crafted to guide you through the multifaceted aspects of cyber investigation, starting with a foundational overview and gradually moving into the complexities of system reconnaissance. You’ll be introduced to various protocols, diving deep into the realm of Windows hacking and the nuances of attacking web technologies. The course is a balanced mix of theory and practical application, aimed at equipping you with the skills necessary to navigate the challenging landscape of cyber forensics.
As you progress, you’ll be immersed in the world of pen testing wireless networks and the rigorous process of forensic investigation. This course is not just a learning pathway; it’s an experience that transforms you into a thinker and analyst, capable of handling the subtleties of digital evidence and artifacts. You’ll be adept at examination and analysis by the end of this journey, ready to tackle other forensics areas and manage incidents with a professional edge and strategic acumen.
Learning Outcomes
This Computer Hacking Forensic Investigator does not require you to have any prior qualifications or experience. You can just enrol and start learning. This course was made by professionals and it is compatible with all PC’s, Mac’s, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection.
After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8.
Overview | |||
Overview | 00:35:00 | ||
Reconnaissance | |||
Reconnaissance | 00:25:00 | ||
Protocols | |||
Protocols | 01:26:00 | ||
Windows Hacking | |||
Windows Hacking | 01:19:00 | ||
Attacking Web Technologies | |||
Attacking Web Technologies | 00:56:00 | ||
Pen Testing Wireless Networks | |||
Pen Testing Wireless Networks | 01:34:00 | ||
Forensic Investigation | |||
Introduction | 00:13:00 | ||
Computer Forensic Incidents | 00:28:00 | ||
Examination and Analysis | |||
Investigation Process | 00:54:00 | ||
Disk Storage Concepts | 00:31:00 | ||
Digital Acquisition & Analysis | 00:24:00 | ||
Protocols | |||
Forensic Examination Protocols | 00:25:00 | ||
Digital Evidence Protocols | 00:21:00 | ||
CFI Theory | 00:25:00 | ||
Digital Evidence | |||
Digital Evidence Presentation | 00:22:00 | ||
Computer Forensic Laboratory Protocols | 00:33:00 | ||
Computer Forensic Processing | 00:22:00 | ||
Digital Forensics Reporting | 00:20:00 | ||
Artifacts | |||
Specialized Artifact Recovery | 00:46:00 | ||
Discovery and ESI | 00:12:00 | ||
Other Forensics | |||
Cell Phone Forensics | 00:21:00 | ||
USB Forensics | 00:06:00 | ||
Incident Handling | |||
Incident Handling | 00:36:00 | ||
PDA Forensics | 00:23:00 | ||
Investigating Harassment | 00:14:00 |
Have you ever scrolled through social media and been blown away by captivating edits? Maybe it was a seamless transition, …
0
Imagine diving into your photos, not just looking at them. Imagine transporting viewers to the heart of your scene, letting …
0
Imagine transforming your stunning photographs into captivating moving narratives. Learn After Effects for Photography unlocks a world of creative possibilities, …
0