About Us|Contact Us|Learn Now: Find a Course
Like us and Save!  Join our Mailing List and Save!
Connect with us for News & Exclusive Offers:
View Cart
Contact Us

Computer Forensics for Beginners Tutorial

 Professionally created, self-study video training.

About this Tutorialshow details
Computer forensics is a new and exciting field, it is a broad topic that touches on many different skills and is gaining popularity.

These Computer Forensics for Beginners tutorial videos are presented via easy-to-follow video training movies where expert tutor Ric Messier take you step-by-step through the entire investigative process explaining all the details that an investigator needs to know.

Through over eleven hours of professionally created video training, the tuition includes an overview of Forensics and the main legal issues, best practices for preparing your investigation and analysis, learning data recovery techniques, the key security considerations, lessons on malware forensics, EnCase tutorial investigation, look at virtual machines and so much more.

The complete training course contents are listed below and you can start learning right away, click any blue linked lesson to sample Free Computer Forensics video tutorials and discover how effective this teaching method is...
Learn this Software - See below for FREE TUTORIALS

Each Course on 1 or 2 CDs or Download
For Mac and PC

FREE Shipping on ALL Orders
Computer Forensics for Beginners Tutorial Info
Tutor: Ric Messier
Duration: 11 hrs / 90 video lessons
This course is currently on offer:
20% OFF & FREE Shipping!
UK Price: £79.95 £63.95 + VAT

EU Price: €84.95 €67.95 + VAT

US & Canada: $124.95 $99.94
Product Code: 01752
Downloads: Training downloadable when payment processed (by next working day)
CDs: Please allow 2-3 days for UK, Europe, US & Canada.
3-5 days rest of world


- All CDs Shipped Carriage FREE -
Compatibility: MS Windows 8, 7, Vista, XP, 2000, 98, NT, Mac OS X, OS 9

Share |

Don't take our word for it, see our CUSTOMER TESTIMONIALS
Benefits of this Software Training
  Tuition by expert tutors.
  Narrated training videos demonstrate the key tools and professional techniques helping you to work faster and smarter.
  Learning is fast as the trainers provide a beginners guide using simplistic terms and minimal jargon.
  Personal Tutoring - Step-by-step video training from your own desktop. Delivered via best selling DVD/CD training or online tuition.
  The tutor transfers knowledge to you quickly and effectively.
  All the concepts of each application are explained clearly and precisely.
  Every course works on PC and Mac.
  Alternative to a boring book or manual and expensive training courses, seminars, workshops & classes.
  You can jump to and from lessons allowing you to learn at your own pace.
  The visual and practical nature shortens the learning curve compared to standard training manuals, basic handbooks, and for dummies books.
Customer Testimonials
Associated Training CDs:
Complete range of Mac OS X Server Tutorials | Complete Range of Microsoft SharePoint Tutorials | Complete Range of Cisco CCNA Tutorials | Using Security Tools | Ethical Hacking & Penetration Testing Advanced | Ethical Hacking & Penetration Testing | Beginners Computer Security | Complete Range of Networking Tutorials | Packet Analysis TCP/IP | Complete Range of Computer Security Tutorials | Complete Range of Microsoft C# Tutorials
Click on any linked lesson below for a FREE demo
Purchased CD tutorials have a higher sound & video quality.

FREE Sample Videos from this Course

What You Should Expect From This Video
About the Tutor
Evidence Acquisition
Boot Processes
Volatile Information
Wireless Tools
Alternate Data Streams
Internet: Cache, Cookies, Etc.
Virtual Machines
Dynamic Malware Analysis

We hope you enjoyed the FREE lessons. To view the complete contents, including ALL the lessons below & above, please purchase the course via CD or Download

What Is Forensics?
Professions Needing Forensics
What You Should Expect From This Video
What You Should Know
What You Will Learn

Legal Issues
Chain Of Custody
Evidence Acquisition
Validating Data Under Linux
Validating Data Under Windows
Expert Witness
Ethics For Experts
Evidence Storage
Rules Of Evidence

Differences With Legal Investigations
Reasons For Corporate Investigations
Preparing For An Investigation
Forensic Workstation
Coroners Toolkit
ProDiscover Basic
Audit Policies
UNIX Tools
Sleuth Kit
DEFT Linux

Operating Systems
Windows Family
Mac OS X
Other Types Of Operating Systems
Boot Processes
File Systems: Windows-Based
File Systems: Linux
File Systems: Mac OS
File Systems: CD
Executable Types And Structure: Windows
Executable Types And Structure: Unix-Based
Disk Partitions

Image Acquisition
Image Formats
Digital Image Acquisitions Under Linux
Digital Image Acquisitions Under Windows
Volatile Information
Data Recovery
Hard Drives

Network Acquisitions
OSI Reference Model
Network Attacks
Reasons For Network Acquisitions
Man In The Middle Attacks
Capturing Traffic
Other Network Tools
Wireless Networking
Wireless Tools
Firewalls And Their Uses
Intrusion Detection Systems

Data Spaces
Alternate Data Streams
Deleted Files
Hidden Partitions
Slack Space And Swap File
Virtual Memory
System Recovery Checkpoints: Windows
Audit Logs And Settings

Data Recovery
Graphics Files
Internet: Cache, Cookies, Etc.
Log Files
Steganography Techniques: Images And Video
Steganography Techniques: Audio And Documents

Virtual Machines
Virtual Machines
Data Formats

Mobile Forensics
Symbian OS
Memory Considerations
SIM Cards

Malware Forensics
Malware Forensics
Static Malware Analysis
Dynamic Malware Analysis

About The Tutor
Trainer Info