Meet Our Experts
David Bigger
Webinars
Computer Forensics: Do Not Become Another Statistic
Computer forensics are a major topic in today’s infrastructures. The need for a professional to analyze hard drives, learn the steps of forensic process, and know data acquisition techniques cannot be under stated. In our ever-changing cyber w...
Take Your Security Skills to 11
Join security expert David Bigger as he explores CompTIA’s highest level certification: CompTIA Advanced Security Practitioner (CASP). This vendor-neutral, globally-recognized certification will not only help you excel in your career, but also...
Security Certification: The Next Level
Join security expert David Bigger as he explores CompTIA's newest and highest level certification. This vendor-neutral globally recognized certification will help you excel in your career and give you leverage over your competition, covering the brea...
Courses
Forensic investigator, Part 10 of 10: Mobile and Reports
The proliferation of mobile devices such as phones, tablet, laptops means investigators will have to deal with mobile devices, malware, and tools for investigation. The second part of this course covers how do we write reports and summarize an inves...
Forensic investigator, Part 09 of 10: Cloud and Web Forensics
The Cloud is everywhere and along with it comes unique challenges for an investigator such as Infrastructure as a service, jurisdictional issues, data locations and web applications. Who owns the data? is it in the same country? how do you find it...
Forensic Investigator, Part 08 of 10: Network and Email Forensics
When is the last time you sent an email? Have you used a network lately to surf the Internet or post to your Facebook? Networks and email are an integral part of today’s enterprise infrastructures, not to mention everyday life at home. Knowing where...
Forensic Investigator, Part 07 of 10: Database Forensics
MySQL, Oracle or MS SQL server….which is it running? How do you know? Oracle may be the number one database on the market today, but what does that mean for us as investigators? Coming up, we will be looking at various database management systems an...
Forensic Investigator, Part 06 of 10: Malware Forensics
When was the last time you scanned your system for problems? Did you find anything during a scan? Malware is a serious problem for end systems and networks in general. We are going to look at malware types like rootkits, viruses and Trojans and how ...
Forensic Investigator, Part 05 of 10: Operating System Forensics
Which operating system are you best with? Do you prefer Linux over Windows, Windows over a Mac or a combination of the three? We are going to take a look at Operating System forensics so you can see in inner workings so we can find potential evidenc...
Forensic Investigator, Part 04 of 10: Data and Anti-Forensics
Dive into data acquisition to discover the differences between live and static acquisitions, as well as to learn about volatile data, or the data that should be acquired first once a system has been determined to be a crime scene. Additionally, explo...
Forensic Investigator, Part 03 of 10: Hard Disks and File Systems
When conducting a forensic investigation, you will be looking for potential evidence that can be used in the court of law to support charges against a criminal. This evidence will be located somewhere on a device, likely on a hard disk or in the file...
Blogs
About the Expert: David Bigger
If you know anything about computer security, you're probably familiar with CompTIA Security+.