• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

360 Android courses delivered Online

Unity Android - Build Eight Mobile Games with Unity and C#

By Packt

This course is designed to equip you with all the skills needed to turn your creative ideas into playable Android games. Your journey through this course involves building 8 sample games that will help you understand the process of creating mobile Android games with Unity and C#. Create fully functional, ready-to-publish Android games from scratch.

Unity Android - Build Eight Mobile Games with Unity and C#
Delivered Online On Demand17 hours 41 minutes
£101.99

MD-102T00 Microsoft 365 Endpoint Administrator

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Microsoft 365 Endpoint Administrator is responsible for deploying, configuring, securing, managing, and monitoring devices and client applications in a corporate setting. Their duties include managing identity, access, policies, updates, and apps. They work alongside the M365 Enterprise Administrator to develop and execute a device strategy that aligns with the requirements of a modern organization. Microsoft 365 Endpoint Administrators should be well-versed in M365 workloads and possess extensive skills and experience in deploying, configuring, and maintaining Windows 11 and later, as well as non-Windows devices. Their role emphasizes cloud services over on-premises management technologies. In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technologies like Microsoft Entra ID, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data. Prerequisites The Modern Desktop Administrator must be familiar with M365 workloads and must have strong skills and experience of deploying, configuring, and maintaining Windows 11 and later, and non-Windows devices. 1 - Explore the Enterprise Desktop Examine benefits of modern management Examine the enterprise desktop life-cycle model Examine planning and purchasing Examine desktop deployment Plan an application deployment Plan for upgrades and retirement 2 - Explore Windows Editions Examine Windows client editions and capabilities Select client edition Examine hardware requirements 3 - Understand Microsoft Entra ID Examine Microsoft Entra ID Compare Microsoft Entra ID and Active Directory Domain Services Examine Microsoft Entra ID as a directory service for cloud apps Compare Microsoft Entra ID P1 and P2 plans Examine Microsoft Entra Domain Services 4 - Manage Microsoft Entra identities Examine RBAC and user roles in Microsoft Entra ID Create and manage users in Microsoft Entra ID Create and manage groups in Microsoft Entra ID Manage Microsoft Entra objects with PowerShell Synchronize objects from AD DS to Microsoft Entra ID 5 - Manage device authentication Describe Microsoft Entra join Examine Microsoft Entra join prerequisites limitations and benefits Join devices to Microsoft Entra ID Manage devices joined to Microsoft Entra ID 6 - Enroll devices using Microsoft Configuration Manager Deploy the Microsoft Configuration Manager client Monitor the Microsoft Configuration Manager client Manage the Microsoft Configuration Manager client 7 - Enroll devices using Microsoft Intune Manage mobile devices with Intune Enable mobile device management Explain considerations for device enrollment Manage corporate enrollment policy Enroll Windows devices in Intune Enroll Android devices in Intune Enroll iOS devices in Intune Explore device enrollment manager Monitor device enrollment Manage devices remotely 8 - Execute device profiles Explore Intune device profiles Create device profiles Create a custom device profile 9 - Oversee device profiles Monitor device profiles in Intune Manage device sync in Intune Manage devices in Intune using scripts 10 - Maintain user profiles Examine user profile Explore user profile types Examine options for minimizing user profile size Deploy and configure folder redirection Sync user state with Enterprise State Roaming Configure Enterprise State Roaming in Azure 11 - Execute mobile application management Examine mobile application management Examine considerations for mobile application management Prepare line-of-business apps for app protection policies Implement mobile application management policies in Intune Manage mobile application management policies in Intune 12 - Deploy and update applications Deploy applications with Intune Add apps to Intune Manage Win32 apps with Intune Deploy applications with Configuration Manager Deploying applications with Group Policy Assign and publish software Explore Microsoft Store for Business Implement Microsoft Store Apps Update Microsoft Store Apps with Intune Assign apps to company employees 13 - Administer endpoint applications Manage apps with Intune Manage Apps on non-enrolled devices Deploy Microsoft 365 Apps with Intune Additional Microsoft 365 Apps Deployment Tools Configure Microsoft Edge Internet Explorer mode App Inventory Review 14 - Protect identities in Microsoft Entra ID Explore Windows Hello for Business Deploy Windows Hello Manage Windows Hello for Business Explore Microsoft Entra ID Protection Manage self-service password reset in Microsoft Entra ID Implement multi-factor authentication 15 - Enable organizational access Enable access to organization resources Explore VPN types and configuration Explore Always On VPN Deploy Always On VPN 16 - Implement device compliance Protect access to resources using Intune Explore device compliance policy Deploy a device compliance policy Explore conditional access Create conditional access policies 17 - Generate inventory and compliance reports Report enrolled devices inventory in Intune Monitor and report device compliance Build custom Intune inventory reports Access Intune using Microsoft Graph API 18 - Deploy device data protection Explore Windows Information Protection Plan Windows Information Protection Implement and use Windows Information Protection Explore Encrypting File System in Windows client Explore BitLocker 19 - Manage Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Examine key capabilities of Microsoft Defender for Endpoint Explore Windows Defender Application Control and Device Guard Explore Microsoft Defender Application Guard Examine Windows Defender Exploit Guard Explore Windows Defender System Guard 20 - Manage Microsoft Defender in Windows client Explore Windows Security Center Explore Windows Defender Credential Guard Manage Microsoft Defender Antivirus Manage Windows Defender Firewall Explore Windows Defender Firewall with Advanced Security 21 - Manage Microsoft Defender for Cloud Apps Explore Microsoft Defender for Cloud Apps Planning Microsoft Defender for Cloud Apps Implement Microsoft Defender for Cloud Apps 22 - Assess deployment readiness Examine deployment guidelines Explore readiness tools Assess application compatibility Explore tools for application compatibility mitigation Prepare network and directory for deployment Plan a pilot 23 - Deploy using the Microsoft Deployment Toolkit Evaluate traditional deployment methods Set up the Microsoft Deployment Toolkit for client deployment Manage and deploy images using the Microsoft Deployment Toolkit 24 - Deploy using Microsoft Configuration Manager Explore client deployment using Configuration Manager Examine deployment components of Configuration Manager Manage client deployment using Configuration Manager Plan in-place upgrades using Configuration Manager 25 - Deploy Devices using Windows Autopilot Use Autopilot for modern deployment Examine requirements for Windows Autopilot Prepare device IDs for Autopilot Implement device registration and out-of-the-box customization Examine Autopilot scenarios Troubleshoot Windows Autopilot 26 - Implement dynamic deployment methods Examine subscription activation Deploy using provisioning packages Use Windows Configuration Designer Use Microsoft Entra join with automatic MDM enrollment 27 - Plan a transition to modern endpoint management Explore using co-management to transition to modern endpoint management Examine prerequisites for co-management Evaluate modern management considerations Evaluate upgrades and migrations in modern transitioning Migrate data when modern transitioning Migrate workloads when modern transitioning 28 - Manage Windows 365 Explore Windows 365 Configure Windows 365 Administer Windows 365 29 - Manage Azure Virtual Desktop Examine Azure Virtual Desktop Explore Azure Virtual Desktop Configure Azure Virtual Desktop Administer Azure Virtual Desktop Additional course details: Nexus Humans MD-102T00 : Microsoft 365 Endpoint Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MD-102T00 : Microsoft 365 Endpoint Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MD-102T00 Microsoft 365 Endpoint Administrator
Delivered Online + more
£2,975

Unity Android - Build a 3D ZigZag Racing Game with C#

By Packt

Build and publish your own Android game in a few hours with the help of this practical-based course. You will gain a working knowledge of Unity and C# while building a 3D ZigZag racing Android game from start to finish. Learning Unity Android game development will provide you with a strong background to build awesome Android games.

Unity Android - Build a 3D ZigZag Racing Game with C#
Delivered Online On Demand11 hours 7 minutes
£82.99

Kotlin for Android: Beginner to Advanced

By Course Cloud

Course Overview Kotlin is one of the most widely used Android app development programming languages, used by the world's most powerful companies, including Google, Facebook and Microsoft. The Kotlin for Android: Beginner to Advanced course will teach you the A-Z of Kotlin applications and how to program them. Starting from the very basics, it will guide you step-by-step through the installation procedures for Windows, Mac, and Linux, as well as the process for building an Android app using Kotlin programming language. This practical training course is ideal for aspiring Android developers, software engineers and anyone looking to learn how to program Kotlin applications through the guidance of an expert. Fast track your career today and add value to your resume with an industry-recognised certificate. This best selling Kotlin for Android: Beginner to Advanced has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Kotlin for Android: Beginner to Advanced is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Kotlin for Android: Beginner to Advanced is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Kotlin for Android: Beginner to Advanced is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Kotlin for Android: Beginner to Advanced, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Kotlin for Android: Beginner to Advanced will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Kotlin for Android: Beginner to Advanced to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Kotlin for Android: Beginner to Advanced
Delivered Online On Demand
£319

Android Studio Admob Integration: Start Showing Ads in Your Mobile App Today!

5.0(10)

By Apex Learning

Overview This comprehensive course on Android Studio Admob Integration: Start Showing Ads in Your Mobile App Today! will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Android Studio Admob Integration: Start Showing Ads in Your Mobile App Today! comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Android Studio Admob Integration: Start Showing Ads in Your Mobile App Today!. It is available to all students, of all academic backgrounds. Requirements Our Android Studio Admob Integration: Start Showing Ads in Your Mobile App Today! is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 1 sections • 3 lectures • 00:50:00 total length •Module 01: Banner Ads Tutorial: 00:24:00 •Module 02: Interstitial Ads Tutorial: 00:16:00 •Module 03: Rewarded Video Ads Tutorial: 00:10:00

Android Studio Admob Integration: Start Showing Ads in Your Mobile App Today!
Delivered Online On Demand50 minutes
£12

Kotlin Development Masterclass

5.0(10)

By Apex Learning

Kotlin is one of the most popular and widely used Android app development programming languages, used by the world's most powerful companies, including Google, Facebook and Microsoft. The Kotlin for Android course will teach you the A-Z of Kotlin applications and how to program them. Starting from the very basics, it will guide you step-by-step through the installation procedures for Windows, Mac, and Linux, the functions of Kotlin programming and the format of coding applications in detail. This practical training course is ideal for aspiring Android developers, software engineers and anyone looking to learn how to program Kotlin applications through the guidance of an expert. Fast-track your career today and add value to your resume with a CPD-accredited Certificate. This Kotlin Programming Bundle Consists of the following Premium courses: Course 01: Kotlin Programming : Android Coding Course 02: Kotlin for Android Course 03: CSS Coding Course 04: Basic C# Coding Course 05: Advanced Diploma in Android App Development Course 06: Ionic & Angular JS: Principles Of Mobile and Web Development Course 07: Swift: Mac and iOS Development Course 08: Cocos2d-x v3 JavaScript: Game Development Course 09: Python Programming for Everybody Course 10: JavaScript Foundations for Everyone Course 11: Android Studio Admob Integration: Start Showing Ads in Your Mobile App Today! Course 12: Flutter & Dart Development for Building iOS and Android Apps Course 13: Bash Scripting, Linux and Shell Programming Course 14: Affiliate Marketing & Passive Income Key features of this Kotlin Programming course: This Kotlin Programming bundle is CPD QS Accredited Learn from anywhere in the world Lifetime access Kotlin Programming is entirely online 24/7 Learner support The Kotlin Programming bundle incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can strengthen your Kotlin Programming expertise and essential knowledge, which will assist you in reaching your goal. Moreover, you can learn Kotlin Programming from any place in your own time without travelling for classes. Enrol now in Kotlin Programming to advance your career, and use the premium study materials from Apex Learning. The Kotlin Programming bundle incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can strengthen your Kotlin Programmingexpertise and essential knowledge, which will assist you in reaching your goal. Certification after completion of Kotlin Programming: PDF Certificate: Free (Previously it was £6*11 = £66) Hard Copy Certificate: Free (For The Title Course: Previously it was £10) CPD 140 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this Kotlin Programming bundle. Requirements Our Kotlin Programming course is fully compatible with PCs, Macs, laptops, tablets and Smartphone devices. Career path Having this Kotlin Programming expertise will increase the value of your CV and open you up to multiple job sectors. Certificates Certificate of completion Digital certificate - Included You will get the PDF Certificate for the title course (Kotlin Programming : Android Coding) absolutely Free! Certificate of completion Hard copy certificate - Included You will get the Hard Copy certificate for the title course (Kotlin Programming : Android Coding) absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The delivery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost.

Kotlin Development Masterclass
Delivered Online On Demand
£100

Kotlin: Android Coding Bible

By Course Cloud

Course Overview Kotlin is one of the most popular Android programming languages, used by the world's leading companies, including Google, Facebook and Microsoft,  The Kotlin: Android Coding Bible course will teach you everything you need to know about Kotlin applications and how to program them. Starting from the very basics, it will guide you through the steps of how to install Kotlin on Windows, Mac, and Linux. It will take you through the functions of Kotlin programming and the format of coding applications in detail. This course is ideal for Android developers and anyone looking to learn how to program Kotlin applications through the guidance of an expert. Gain an industry-recognised qualification and fast track your career today. This best selling Kotlin: Android Coding Bible has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Kotlin: Android Coding Bible is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Kotlin: Android Coding Bible is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Kotlin: Android Coding Bible is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Kotlin: Android Coding Bible, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Kotlin: Android Coding Bible will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Kotlin: Android Coding Bible to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Kotlin: Android Coding Bible
Delivered Online On Demand
£25

Unity Android: Build 3D Endless Runner Hyper Casual Game

By Packt

Build a 3D endless runner game with Unity and C# and create a hyper casual runner game for mobile and PC

Unity Android: Build 3D Endless Runner Hyper Casual Game
Delivered Online On Demand9 hours 50 minutes
£127.99

The Complete Guide to Android Bug Bounty Penetration Tests

By Packt

Get hands-on with specialized tools to scan, attack, and decompile code.

The Complete Guide to Android Bug Bounty Penetration Tests
Delivered Online On Demand1 hour 51 minutes
£69.99

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered Online
£3,495
1...34567...36