Meet Our Experts

David Bigger

David Bigger is the lead trainer at Bigger IT Solutions. He has been information technology for a little over 20 years and has been training all over the US. He has worked with companies like US Military, Lockheed Martin, General Dynamics, Dominos Pizza, University of Utah and Expedia


Webinars

Computer Forensics: Do Not Become Another Statistic

Computer forensics are a major topic in today’s infrastructures. The need for a professional to analyze hard drives, learn the steps of forensic process, and know data acquisition techniques cannot be under stated. In our ever-changing cyber w...

Security

Take Your Security Skills to 11

Join security expert David Bigger as he explores CompTIA’s highest level certification: CompTIA Advanced Security Practitioner (CASP). This vendor-neutral, globally-recognized certification will not only help you excel in your career, but also...

Security


Security Certification: The Next Level

Join security expert David Bigger as he explores CompTIA's newest and highest level certification. This vendor-neutral globally recognized certification will help you excel in your career and give you leverage over your competition, covering the brea...

Security



Courses

Forensic investigator, Part 10 of 10: Mobile and Reports

The proliferation of mobile devices such as phones, tablet, laptops means investigators will have to deal with mobile devices, malware, and tools for investigation. The second part of this course covers how do we write reports and summarize an inves...

Ethical HackingSecurity

Forensic investigator, Part 09 of 10: Cloud and Web Forensics

The Cloud is everywhere and along with it comes unique challenges for an investigator such as Infrastructure as a service, jurisdictional issues, data locations and web applications. Who owns the data? is it in the same country? how do you find it...

Ethical HackingSecurity


Forensic Investigator, Part 08 of 10: Network and Email Forensics

When is the last time you sent an email? Have you used a network lately to surf the Internet or post to your Facebook? Networks and email are an integral part of today’s enterprise infrastructures, not to mention everyday life at home. Knowing where...

Ethical HackingSecurity

Forensic Investigator, Part 07 of 10: Database Forensics

MySQL, Oracle or MS SQL server….which is it running? How do you know? Oracle may be the number one database on the market today, but what does that mean for us as investigators? Coming up, we will be looking at various database management systems an...

Ethical HackingSecurity


Forensic Investigator, Part 06 of 10: Malware Forensics

When was the last time you scanned your system for problems? Did you find anything during a scan? Malware is a serious problem for end systems and networks in general. We are going to look at malware types like rootkits, viruses and Trojans and how ...

Ethical HackingSecurity

Forensic Investigator, Part 05 of 10: Operating System Forensics

Which operating system are you best with? Do you prefer Linux over Windows, Windows over a Mac or a combination of the three? We are going to take a look at Operating System forensics so you can see in inner workings so we can find potential evidenc...

Ethical HackingSecurity


Forensic Investigator, Part 04 of 10: Data and Anti-Forensics

Dive into data acquisition to discover the differences between live and static acquisitions, as well as to learn about volatile data, or the data that should be acquired first once a system has been determined to be a crime scene. Additionally, explo...

Ethical HackingSecurity

Forensic Investigator, Part 03 of 10: Hard Disks and File Systems

When conducting a forensic investigation, you will be looking for potential evidence that can be used in the court of law to support charges against a criminal. This evidence will be located somewhere on a device, likely on a hard disk or in the file...

Ethical HackingSecurity




Blogs

About the Expert: David Bigger

If you know anything about computer security, you're probably familiar with CompTIA Security+.

CASPSecurity



Explore Our Blogs, Courses and Webinars