Computer Forensic Investigation Process …In this Process , we follow some steps which are as follows :-Jul 11, 2022Jul 11, 2022
Microsoft Active Directory 😁Attack …Active Directory is a directory service developed by Microsoft to manage the Windows domain network .May 28, 2022May 28, 2022
Splunk TrainingThis eLearning course introduces students to what machine data is — and how Splunk can leverage operational intelligence to investigate…May 19, 2022May 19, 2022
Attack-IQ websiteThe Attack-IQ Security Optimization Platform enables a threat-informed defense across your organization, improving efficiency and…May 10, 2022May 10, 2022
Foundation of MITRE Attack …Computer code has turned every part of civilization into a potential target. Adversaries across the globe, from nation-states to criminal…May 9, 2022May 9, 2022
Fire Alone hurt …People always say that fire is all about to burn but in my case this is about to grow or i can say to motivate me about the problem’s in…Feb 20, 2022Feb 20, 2022
“The Rebirth of BUDDHA “Really this person is more than a normal human, he is the only one who teach the world , a new form of life which is beyond the normal…Feb 20, 2022Feb 20, 2022
Types of InvestigationThere are four main types of investigation performed by digital forensics specialists .Feb 11, 2022Feb 11, 2022