An explanation of the data stored by CCTV systems, how the data can be extracted, and what analysis techniques are available.
This webinar provides an overview of the exfiltration techniques used by infiltrators, key sources of evidence available, and investigation methodologies used.
This webinar gives examples of devices and data types that Hawkins regularly examine, as well as some fascinating case studies.
A deep dive into what metadata is, where it exists, and how it can be used as evidence during an investigation.