This course provides practical, to-the-point training for the busy executive, in everyday language, complete with examples that are easy to understand the big picture events driving cybercrimes today and the top cyber risks affecting executives and their organizations.
This two-day course covers a wide range of baseline topics, including terminologies, the basics of computer networks, security policies, incident response, passwords, and even an introduction to cryptographic principles.
This is an introductory course that will explain the concepts of computer forensics as well as demonstrations of proper collections of digital
This course aims to enable investigators to investigate the Apple devices they encounter.
In a world where smartphones store gigabytes of personally identifiable information, human negligence remains the single biggest threat to the security of your personal and corporate information.
Learn about integrated endpoint protection, network security risk management and enhanced user behaviour analysis for predictive security protection.
Mobile devices are often a key factor in criminal cases, intrusions, IP theft, security threats, accident reconstruction, and more.
You cannot protect what you do not know, and understanding forensic capabilities and artefacts is a fundamental cog of information security.
There was a problem reporting this post.
Please confirm you want to block this member.
You will no longer be able to:
Please note: This action will also remove this member from your connections and send a report to the site admin. Please allow a few minutes for this process to complete.
Subscribe to our newsletter and stay updated with the latest in cybersecurity and digital forensics.