BasicComputer Hardware
Network Hardware Mobile & Computer Operating System Boot Sequence & POST Types of Software Cache and Internet Network protocols Internet Corporation for Assigned Names and Numbers IP / MAC / IMEI Advance
Searching
Who is, People, Location, Website, IMEI, MAC, IP Port Scanning Understanding Communication Protocol Case StudyThe Cases in
|
Forensics
HDD
Collecting Digital Evidence, Imaging & Cloning, File Extensions, Windows Files and Partitions Analysis Files Analyzing logs files, Analyzing thumbs.db files, SIM Contact, Messages, Digital Media files, Browser, Website Recovery Password ( Email, Office file, PDF File) Recycle bin forensics Delete data TechniquesEmail
Verification, Spoofing, Tracking, Header Analysis, Auto Responder, Log monitoring Mobile Call Recording & Logging Caller ID Protection, Spoofing, Blocking, Analysis
IP Address Filters
Analyzing Web Server Log Viewing Local Windows Firewall Log Viewing Windows Event Log Protocol Analysis |
SecurityLaptop Security and PC Security,
Mobile Security and Tab Security, Internet Protocol and CCTV Security, Credit Card Security, Browser Privacy & Security, Online Banking & E-Shopping Security, E-mail Security and Website Security, Encryption and DecryptionMobile & Computer Stenography,
Cryptography, Symmetric and Asymmetric. Investigation
Website Analysis,
IP Tracking, Mobile Tracking, Demo Case Studies, Checklist, Generating MD5 hash values. OpportunityHow to become a expert in this filed?
How to get a job and where ? Career Guidance.. Graduation.. in this field |
Workshop Highlights
|
Benefits
.
|