EC-Council Computer Hacking Forensic Investigation
This course is focused on digital forensics, reasons to perform digital forensics, types of digital forensics, search for evidence and fingerprints on the seized computer, acquisition and seizure methodologies of digital devices, knowledge of Windows, collection of forensic information , volatile and non-volatile, RAM dump forensics. You'll also learn about deleted file recovery, steganography analysis, multimedia forensics, and anti-forensic techniques used by hackers to erase evidence.
Duration: 40 hours.