Computer
Meest recente samenvattingen op de Computer. Op zoek naar een samenvatting op de Computer? Wij hebben diverse samenvattingen voor jouw school of universiteit.
-
80378
- 0
-
15
All courses for Computer
-
COMPUTER 80378
-
COMPUTER / 2
-
Computer] 5
-
Computer' 17
-
Computer 45
Laatste content Computer
This certification introduces essential knowledge of cryptocurrencies and blockchain analytics. Candidates gain foundational skills in understanding transaction mechanics, wallets, exchanges, and blockchain transparency. The exam is ideal for beginners entering crypto investigations, compliance, or financial crime analysis roles.
- Tentamen (uitwerkingen)
- • 92 pagina's's •
-
Computer•Computer
Voorbeeld 4 van de 92 pagina's
Document laden...
This certification introduces essential knowledge of cryptocurrencies and blockchain analytics. Candidates gain foundational skills in understanding transaction mechanics, wallets, exchanges, and blockchain transparency. The exam is ideal for beginners entering crypto investigations, compliance, or financial crime analysis roles.
This certification validates expertise in assessing and managing cryptocurrency-related financial risks. Topics include AML/CFT risk assessment, sanctions exposure, exchange compliance, and threat typologies. Candidates learn to identify high-risk entities, evaluate transaction behaviors, and implement effective crypto risk mitigation strategies.
- Tentamen (uitwerkingen)
- • 115 pagina's's •
-
Computer•Computer
Voorbeeld 4 van de 115 pagina's
Document laden...
This certification validates expertise in assessing and managing cryptocurrency-related financial risks. Topics include AML/CFT risk assessment, sanctions exposure, exchange compliance, and threat typologies. Candidates learn to identify high-risk entities, evaluate transaction behaviors, and implement effective crypto risk mitigation strategies.
This advanced certification focuses on blockchain transaction tracing and investigative methodologies. Candidates develop skills in identifying transaction flows, clustering wallets, tracking illicit funds, and interpreting blockchain analytics. The exam is designed for investigators, analysts, and law enforcement professionals involved in crypto-related investigations.
- Tentamen (uitwerkingen)
- • 89 pagina's's •
-
Computer•Computer
Voorbeeld 4 van de 89 pagina's
Document laden...
This advanced certification focuses on blockchain transaction tracing and investigative methodologies. Candidates develop skills in identifying transaction flows, clustering wallets, tracking illicit funds, and interpreting blockchain analytics. The exam is designed for investigators, analysts, and law enforcement professionals involved in crypto-related investigations.
This foundational certification provides a strong understanding of blockchain technology and cryptocurrency ecosystems. Candidates learn core concepts such as distributed ledgers, consensus mechanisms, wallets, exchanges, and transaction structures. The exam prepares professionals to understand how cryptocurrencies are used, traced, and regulated in financial and investigative contexts.
- Tentamen (uitwerkingen)
- • 96 pagina's's •
-
Computer•Computer
Voorbeeld 4 van de 96 pagina's
Document laden...
This foundational certification provides a strong understanding of blockchain technology and cryptocurrency ecosystems. Candidates learn core concepts such as distributed ledgers, consensus mechanisms, wallets, exchanges, and transaction structures. The exam prepares professionals to understand how cryptocurrencies are used, traced, and regulated in financial and investigative contexts.
This certification validates comprehensive mobile forensic capabilities across Android and iOS platforms. Topics include logical and physical data extraction, application artifacts, deleted data recovery, cloud backups, and mobile malware analysis. The exam also emphasizes encryption challenges, legal considerations, and best practices for handling mobile digital evidence.
- Tentamen (uitwerkingen)
- • 90 pagina's's •
-
Computer•Computer
Voorbeeld 4 van de 90 pagina's
Document laden...
This certification validates comprehensive mobile forensic capabilities across Android and iOS platforms. Topics include logical and physical data extraction, application artifacts, deleted data recovery, cloud backups, and mobile malware analysis. The exam also emphasizes encryption challenges, legal considerations, and best practices for handling mobile digital evidence.
Designed for Windows forensic professionals, this exam evaluates expertise in NTFS analysis, registry forensics, event logs, memory dumps, and system artifacts. Candidates learn to reconstruct user activity, detect persistence mechanisms, analyze malware traces, and perform timeline correlation in enterprise and personal Windows environments.
- Tentamen (uitwerkingen)
- • 87 pagina's's •
-
Computer•Computer
Voorbeeld 4 van de 87 pagina's
Document laden...
Designed for Windows forensic professionals, this exam evaluates expertise in NTFS analysis, registry forensics, event logs, memory dumps, and system artifacts. Candidates learn to reconstruct user activity, detect persistence mechanisms, analyze malware traces, and perform timeline correlation in enterprise and personal Windows environments.
This certification targets forensic investigations on macOS systems. It covers APFS file systems, system logs, Spotlight metadata, iCloud artifacts, and macOS security mechanisms. Candidates gain skills in user behavior analysis, application artifacts, and evidence extraction while maintaining forensic integrity within Apple’s evolving ecosystem.
- Tentamen (uitwerkingen)
- • 103 pagina's's •
-
Computer•Computer
Voorbeeld 4 van de 103 pagina's
Document laden...
This certification targets forensic investigations on macOS systems. It covers APFS file systems, system logs, Spotlight metadata, iCloud artifacts, and macOS security mechanisms. Candidates gain skills in user behavior analysis, application artifacts, and evidence extraction while maintaining forensic integrity within Apple’s evolving ecosystem.
Focused on Linux-based investigations, this certification validates skills in analyzing file systems, logs, memory, and processes across Linux distributions. Candidates demonstrate expertise in command-line forensics, timeline analysis, malware detection, and user activity reconstruction. The exam also addresses live response techniques and forensic challenges in server and enterprise Linux environments.
- Tentamen (uitwerkingen)
- • 89 pagina's's •
-
Computer•Computer
Voorbeeld 4 van de 89 pagina's
Document laden...
Focused on Linux-based investigations, this certification validates skills in analyzing file systems, logs, memory, and processes across Linux distributions. Candidates demonstrate expertise in command-line forensics, timeline analysis, malware detection, and user activity reconstruction. The exam also addresses live response techniques and forensic challenges in server and enterprise Linux environments.
This certification assesses proficiency in cloud-based digital forensics across IaaS, PaaS, and SaaS environments. Candidates learn evidence acquisition from cloud service providers, virtual machines, containers, and cloud-native logs. The exam emphasizes incident response, multi-tenant challenges, data jurisdiction issues, chain of custody, and forensic readiness in modern cloud infrastructures.
- Tentamen (uitwerkingen)
- • 93 pagina's's •
-
Computer•Computer
Voorbeeld 4 van de 93 pagina's
Document laden...
This certification assesses proficiency in cloud-based digital forensics across IaaS, PaaS, and SaaS environments. Candidates learn evidence acquisition from cloud service providers, virtual machines, containers, and cloud-native logs. The exam emphasizes incident response, multi-tenant challenges, data jurisdiction issues, chain of custody, and forensic readiness in modern cloud infrastructures.
This exam certifies skills in the forensic investigation of unmanned aerial vehicles (UAVs). Topics include drone hardware components, onboard storage, flight logs, GPS telemetry, camera metadata, and controller analysis. Candidates learn crash scene investigation, data extraction techniques, airspace regulation compliance, and methods to reconstruct flight paths for evidentiary purposes.
- Tentamen (uitwerkingen)
- • 96 pagina's's •
-
Computer•Computer
Voorbeeld 4 van de 96 pagina's
Document laden...
This exam certifies skills in the forensic investigation of unmanned aerial vehicles (UAVs). Topics include drone hardware components, onboard storage, flight logs, GPS telemetry, camera metadata, and controller analysis. Candidates learn crash scene investigation, data extraction techniques, airspace regulation compliance, and methods to reconstruct flight paths for evidentiary purposes.