Why we need a full forensic image, what is possible with forensic analysis, adding services for private investigators and basic security


Why we need a full forensic image, what is possible with forensic analysis, adding services for private investigators and basic security


Segment One - We explore why we need a full forensic image. Segment Two - Examples of what information can be retreived during a forensic analysis. Segment Three - How private investigators can add easy to perform computer security analysis to their service offerings. Segment Four - Understanding the basics of remote desktop, virtual private networks and two-factor authentication.