JW Cyber Forensics, LLC
Data Forensics and Retrieval
Home | Data Forensics | Data Retrieval | About Us | Why Use Us?
JW
Cyber Forensics focuses on collecting and analyzing data from computer
systems to track user-based activity that can be used internally or in
civil/criminal litigation. We posses a firm understanding of computer
forensics tools and techniques to investigate data breach intrusions,
tech-savvy rogue employees, advanced persistent threats, and complex
digital forensic cases. Forensic investigators must master a variety of
operating systems, investigation techniques, incident response tactics,
and even legal issues in order to solve challenging cases. To this end,
we have been exposed to critical forensic analysis techniques and tools
in a hands-on setting for both Windows- and Linux-based investigations.
WMF has examined various investigation methodologies and techniques,
discovering new places to find evidence and discover the tracks of a
cyber criminal or hacker, who is trying to stay hidden inside a
network. We use the best tool for the job, whether it be AccessData’s
FTK, Encase, X-Way Forensics Suite, Sleuthkit, Foremost, and the HELIX3
Pro Forensics Live CD and HELIX Live Response.
John is
comfortable in the computer world, having been a programmer as well as
a maintenance technician on Ohio Scientific mini-computers, in another
life. As an adjunct professor at The Corcoran College of Art and Design
in Washington, DC and as a Certified Editor and Trainer for Apple’s
Final Cut Pro editing software, John has proven to be an effective
communicator and instructor.
John is currently an adjunct
professor with Utica College in Utica, NY and has taught for the new
EC-Council University in Albuquerque, NM teaching CyberSecurity and
Forensics courses. He is also a certified instructor for AccessData’s
Forensic Tool Kit software suite.
Thanks for visiting and if we can be of any help to you with your Forensic investigations, please contact us.
John Wulff
JW Cyber Forensics, LLC
FEIN: 27-1368511
Home | Data Forensics | Data Retrieval | About Us | Why Use Us?
© 2010 to 2017 JW Cyber Forensics, LLC EMAIL