< All Computer Hacking and Forensics Notes

YoussefM | Computer and Hacking Forensics | Introduction

By: YoussefM | Related Course: Computer Hacking and Forensics | Published: October 19, 2017 | Modified: October 19, 2017
Join Cybrary

NotepadForensics Overview

Forensics Overview

There are 15 Modules in the Computer Forensics class. The course begins by introducing you to Computer Hacking and Forensics and we’ll close out with an Exam review Module as well. This whiteboard presentation provides nicely details and highlights for you the informational modules, the nitty-gritty detailed modules as well as the core modules whose content will be a focus of your Computer Hacking and Forensics exam.
You’ll also be introduced to a wide array of topics that while not as popular as the modules listed below, are just as critical for establishing expertise in the field, and should be equally valued on your radar for mastering Computer Hacking and Forensics. You’ll learn why Mobile Reporting, Incident Handling and hardware technologies such as audio & video, and operating systems such as Linux and MAC are essential to mastering as a Computer Hacking and Forensics professional.
The Modules explored in this chapter include:
Module 1: Modern Forensics
Module 2: Investigative Process
Module: 3 Searching and Seizing
Module 4: Digital Evidence
Module 5: First Responder
Module 6: Computer Forensics labs
Module 7: Hard Disks and File Systems
Module 8: Windows Forensics
Module 9: Data Acquisition
Module 10: Recovering and Deleting Files
Module 11: Access Data
Module 12: Image Files
Module 13: Steganography
Module 14: Application Password
Module 15: Log Capture and Event Correlation, and finally
Exam Module

< All Computer Hacking and Forensics Notes
Join Cybrary

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?