![](https://bearnt.wordpress.com/wp-content/uploads/2017/02/handbook.jpg?w=800)
![](https://bearnt.wordpress.com/wp-content/uploads/2017/02/handbook.jpg?w=800)
![](https://bearnt.wordpress.com/wp-content/uploads/2017/02/scsh18.jpg?w=859)
Eric.Rouge – Forensic Investigation
![](https://bearnt.wordpress.com/wp-content/uploads/2017/02/open-source-forensic-tools11.jpg?w=980)
2016-S2-SEC601-Lab 15 / Computer Forensic Tools
![](https://bearnt.wordpress.com/wp-content/uploads/2017/02/steganography.jpg?w=980)
2016-S2-SEC601-Lab 5 / Steganography
![](https://bearnt.wordpress.com/wp-content/uploads/2016/09/virus-trojan-rootkit.jpeg?w=640)
2016-S2-SEC601-Lab 2 / Trojans and Malware Protection
![](https://bearnt.wordpress.com/wp-content/uploads/2016/09/network-vulnerabilities.jpg?w=471)
2016-S2-SEC601-Lab 3 / Network Vulnerabilities
![](https://bearnt.wordpress.com/wp-content/uploads/2016/09/microsoft-baseline-security-analyzer-2-3-for-it-professionals-free-download.png?w=200)
2016-S2-SEC601-Lab 4 / Baseline Security Analyser
![](https://bearnt.wordpress.com/wp-content/uploads/2016/09/certificate-services.jpeg?w=590)
2016-S2-SEC601-Lab 6 / Configuring Certificate Services
![](https://bearnt.wordpress.com/wp-content/uploads/2016/09/password-sniffer.jpg?w=980)
2016-S2-SEC601-Lab 7 / Password Sniffing
![](https://bearnt.wordpress.com/wp-content/uploads/2016/09/ftp.jpg?w=582)