About:
This is What I have to offer;
- Recover lost data and information and assess the completeness and the credibility of the data.
- Conduct investigation post breaches or incidents, including identifying any other systems impacted and ensuring such doesn't occur in future.
- Document any findings that may be discovered.
- collect the information is legally admissible manner.
- Advise the security personnel on how to stay current in all areas of Information Technology in regard to malicious attacks and security breaches.
- Advise companies and agencies on IT system Vulnerability and Protection against Malware and Hackers.
- Email forensics
- USB forensics
- Network forensics
- Harddisk forensic
- Cloud and IoT forensics.
- Mobile forensics
- Metadata extraction
- Stalker identification and tracking
- Expert and professional digital forensic report
- Vulnerability analysis
- Development of security tool
Reviews
:
thanks for everything!
: : : :
No comments:
Post a Comment