Once an image of the device in question has been obtained, file and recovery forensics can be attempted. In this lab, you will take the image created in a previous lab to investigate a possible data breach in your company.
Continuing Professional Education (CPE) Credit Count: 2