Rahul KumarComputer Forensic Investigation Process …In this Process , we follow some steps which are as follows :-5 min read·Jul 11, 2022----
Rahul KumarOSINT for Beginner’sTechniques to get you started your Journey in OSINT …3 min read·Jul 9, 2022----
Rahul KumarMicrosoft Active Directory 😁Attack …Active Directory is a directory service developed by Microsoft to manage the Windows domain network .3 min read·May 28, 2022----
Rahul KumarSplunk TrainingThis eLearning course introduces students to what machine data is — and how Splunk can leverage operational intelligence to investigate…1 min read·May 19, 2022----
Rahul KumarAttack-IQ websiteThe Attack-IQ Security Optimization Platform enables a threat-informed defense across your organization, improving efficiency and…2 min read·May 10, 2022----
Rahul KumarFoundation of MITRE Attack …Computer code has turned every part of civilization into a potential target. Adversaries across the globe, from nation-states to criminal…2 min read·May 9, 2022----
Rahul KumarFire Alone hurt …People always say that fire is all about to burn but in my case this is about to grow or i can say to motivate me about the problem’s in…1 min read·Feb 20, 2022----
Rahul Kumar“The Rebirth of BUDDHA “Really this person is more than a normal human, he is the only one who teach the world , a new form of life which is beyond the normal…2 min read·Feb 20, 2022----
Rahul KumarTypes of InvestigationThere are four main types of investigation performed by digital forensics specialists .3 min read·Feb 11, 2022----