Seeks cybercrime safely
Discover the keys and work methodology to carry out an investigation in a computer expert. Known assembly techniques to extract valuable information from a support without altering the status. This allows you to search for hidden, damaged, and even deleted data.
With these courses you will know the necessary steps to perform a forensic analysis: identification, acquisition, preservation, analysis and documentation.