Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

3 Scary Possibilities for Cybercrime

 

Rating :

 

Comments

 
  • mcoates1
    mcoates1 at March 08,2016
    This video is great. I like how it shows in depth the realities of the field of Computer Forensics. It showed the legal aspect, law enforcement, military and other branches of the career and where it could take you. I think this video has made me more interested in being involved in this profession.
  • mcoates1
    mcoates1 at March 08,2016
    This video is great. I like how it shows in depth the realities of the field of Computer Forensics. It showed the legal aspect, law enforcement, military and other branches of the career and where it could take you. I think this video has made me more interested in being involved in this profession.
  • mcoates1
    mcoates1 at March 08,2016
    This video is great. I like how it shows in depth the realities of the field of Computer Forensics. It showed the legal aspect, law enforcement, military and other branches of the career and where it could take you. I think this video has made me more interested in being involved in this profession.
  • haneen
    haneen at March 10,2016
    The forensic evidence is so sensitive, and it is a way bigger than any other evidence. The forensic guys should dig deeper to find more and as soon as they find the evidence. Digital evidence might point and lead to more than expecting to have just a hard drive. crimes and criminals. This is so important science.
  • tcmahony
    tcmahony at March 19,2016
    Really interesting to see how the various branches of the DoD uses computer forensics to aid in criminal investigations. It was really interesting to see how they use specific hardware tools to image hard drives. From the modules to date we have only used software based tools. It was also interesting to see how they physically extracted microchips for analysis in their investigations and that they could still analyze various media types even though they might have been severely damaged. Just goes to show you that a simple deletion can't save a criminal from destroying incriminating evidence.
    • «
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved