Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

3 Scary Possibilities for Cybercrime

 

Rating :

 

Comments

 
  • stadkal
    stadkal at April 21,2016
    Practical things that a digital investigator face during investigation are shown in very good way.
  • adam
    adam at April 25,2016
    The DCFL is no joke. They always push the limits of what can be done in examination of forensic media. Their Defense Cyber Investigations Training Academy (DCITA) is a fantastic school that prepares its students to handle almost any type of forensic examination.
  • jnegron
    jnegron at April 27,2016
    Really like the video and the point of view from the Examiners.
  • jpnick99
    jpnick99 at June 12,2016
    Nice overview of computer forensics in action. One of the interviewees in the video mentioned the full spectrum of law enforcement. This is a key point, and it is critical in this day and age to be able to focus that full spectrum on the crime and the individuals involved. More and more, computer forensics is coming to the forefront as one of the most important components of that full spectrum attack.
  • dgrove
    dgrove at June 17,2016
    There is not a single crime in my mind where computer forensics does not have a role. I am not limiting this to the traditional term of computers either, laptops and desktops. Mobile devices such as cell phones and tablets are now just as essential evidence in crimes as anything else. I could argue mobile device are starting to become a bigger part in computer forensics as it pertains to law enforcement investigations than "computers". Computer Forensics is an exciting field to be in just for the fact we always have to stay on top of our game as technology advances people will figure out how to use said technology for nefarious purposes, and we need to figure how they did it.
    • «
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved