FireEye consultants frequently utilize Windows registry data when performing forensic analysis of computer networks as part of incident response and compromise assessment missions. This can be useful ...
Introduction to Computer Forensics. (3) An introduction to computer forensics. The course will cover a range of computer hardware and forensics software tools on current and past operating systems.