Ideal attendee profile:Security Analyst, Forensic Specialist, Security Specialist, Security Engineer
The subject of the course mainly includes the analysis of user activity (browsed websites, opened files) and determining their identity and the equipment they use. During the training, the following issues will be discussed in-depth: verification of e-mail messages, their content, origin and how to read data from e-mail programs. Each stage of the training will be completed with an analysis of the results obtained.
The “Practical computer forensics – Professional” training is dedicated to people who participated in the training at the Specialist level.