✨ Get 20% OFF your first order. ✨

Your Shopping Bag

Your bag is empty

Subtotal $0.00
Shipping Calculated at checkout
Continue Shopping

Essential Project Ares Enterprise + Computer Hacking Forensic Investigator Bundle Collection [c5yOfgKp]

$74.99 $239.99 -69%

Project Ares Enterprise BundleVirtual Courses & LabsComputer Forensics in Today’s WorldComputer Forensics Investigation ProcessCreating a Case in AutopsyCreating a Case in FTKCreating a Case in OSFUnderstanding Hard Disks and File SystemsHash Ver

Secure Shopping

100% Safe Guarantee

Free Shipping

On orders over $30

Money-Back

30-Day Guarantee

Project Ares Enterprise Bundle

Virtual Courses & Labs

  • Computer Forensics in Today’s World
  • Computer Forensics Investigation Process
    • Creating a Case in Autopsy
    • Creating a Case in FTK
    • Creating a Case in OSF
  • Understanding Hard Disks and File Systems
    • Hash Verification
    • Intro To Linux - File Systems
  • Operating System Forensics
    • Event Logs
    • Registry Analysis
    • Creating a Baseline Using the Windows Forensic Toolchest (WFT)
    • Windows Event Log Manipulation via Windows Event Viewer
    • Linux Analysis
    • Securing Linux - Host Based IDS
    • Securing Linux - Log Monitoring and Auditd
    • MAC Analysis
  • Defeating Anti-Forensics Techniques
    • Open Source Password Cracking
    • Password Cracking with PRTK
  • Data Acquisition and Duplication
    • Metadata Extraction Lab
    • Data Recovery with Autopsy
    • Memory Extraction and Analysis
  • Network Forensics
    • Network Miner
    • Monitoring Network Traffic
    • Searching for Indicators of Compromise
    • Use pfTop to Analyze Network Traffic
    • Automated in-Depth Packet Decoding
    • Parse Files Out of Network Traffic
    • Securing Linux - Network Intrusion Detection
  • Investigating Web Attacks
    • Internet History
    • WebApp Attack PCAP Analysis
    • Recover from Web-Based
    • Flashpack Incident
  • Database Forensics
  • Cloud Forensics
  • Malware Forensics
    • Analyze Malicious Activity in Memory Using Volatility
    • Conduct Log Analysis and Cross Examination for False Positives
    • Detect the Introduction of a Malicious Application
    • Identify and Remove Trojan Using Various Tools
    • Identify Suspicious Information in VM Snapshots
  • Investigating E-mail Crimes
  • Mobile Forensics
  • Investigative Reports
  • Capstone Labs:
    • Practical - Photos R Us
    • Image Forensics Capstone
    • Dynamic Malware Analysis Capstone
    • Incident Detection and Identification

What Our Customers Say

December 29, 2025

Absolutely no complaints!

Works great. Very happy with it.

- Blair N..

December 29, 2025

Absolutely no complaints!

Excellent build quality for the price.

- Aniya B..

December 29, 2025

Absolutely no complaints!

I'm happy with my purchase.

- Kristi W..

Write a Review

You Might Also Like

Discover more great products from our collection.

Set of Three Estate Planters

Set of Three Estate Planters

(474)
$32.99 $105.99 -69%
Oliver LED Pendant in Black

Oliver LED Pendant in Black

(653)
$50.99 $163.99 -69%
Gift Card

Gift Card

(2)
$16.99 $54.99 -69%

Copyright 2025 © mappa-mercia.org

VISA
PayPal
Stripe
Mastercard
CASH ON DELIVERY