June 17, 2020
Segment One - We explore why we need a full forensic image. Segment Two - Examples of what information can be retreived during a forensic analysis. Segment Three - How private investigators can add easy to perform computer security analysis to their service offerings. Segment Four - Understanding the basics of remote desktop, virtual private networks and two-factor authentication.