PV
Aug 29, 2021
This course as described provides basic concepts for any beginners who might be interested in this field. Big concepts explained in a easy, clear and concise manner. Content very well presented.
AL
Nov 2, 2021
Lectures are very detailed with step by steps procedures to satisfy the court's requirements.Learned a lot of new industry standard programs to capture data for evidence.
By Apoorva K A
•Jul 23, 2021
Excellent course with very clear explanations by the instructor. Would highly recommend the course for the learner's who are passionate in learning Forensics.
By Giuseppe B
•Oct 24, 2021
Excellent course that includes the principles of Digital Forensic and a good review of the elements of networks and systems. I really appreciated both the approach to the real environment to be investigated and the purely IT one that is more similar to me.
By Muhammad R S A
•Dec 1, 2021
Whole procedure is explained very well. Could've given path to .vmdk files so we could follow through with some demonstrations but otherwise all was well-explained.
By Edson E H G
•Jan 27, 2022
The course documentation had to be obtained in other places. The activities were a little explanatory. The final quiz was focused on networks instead of forensics.
By Juan R
•Jul 25, 2022
Awesome, really i completed my concepts about this especialization, knew how much love that
By Amr E M
•Oct 17, 2021
The course provides a nice introduction. Its eay to understand and follow. I only wish it went more into depth and practical skills
By Amb P M S
•May 17, 2025
Strengths: Clear and Detailed Explanation: The breakdown of the expertise judiciaire en informatique is both clear and comprehensive, covering various aspects such as the role of the expert, methodologies, tools, and specific types of expertise in the field. This provides the reader with a well-rounded understanding of the subject. Logical Structure: The transcript is structured in a way that makes it easy for the reader to follow. Each section is clearly delineated, helping guide the reader through the different topics related to forensic computing and digital forensics. Thorough Coverage of Key Concepts: You have addressed a wide range of topics, including risk types, methodology, tools, and responsibilities, which gives the reader an exhaustive view of the field of judicial computing expertise. This kind of coverage is crucial for someone who might be unfamiliar with the topic. Real-Life Examples: The inclusion of real-world examples, such as "piratage informatique" (hacking) and "fraude bancaire en ligne" (online banking fraud), strengthens the explanation and makes it relatable. It helps the reader visualize how these principles apply in practical, real-world scenarios. Areas for Improvement: Clarification of Risk Management Framework: As suggested, incorporating a specific risk management framework would provide a more formal structure to the discussion. For example, you could mention models such as the Risk Identification-Assessment-Mitigation framework, or tools like SWOT analysis, which could help explain how these frameworks relate to managing the risks associated with digital forensics. Use of Terminology Consistency: It’s important to maintain consistency in terminology, especially when discussing critical concepts such as risk mitigation vs. risk management strategies. While both terms are used correctly, defining them clearly and using one term consistently throughout the transcript would avoid potential confusion. Deepening the Legal Aspect: You mentioned the ICJ advisory opinion, which was crucial in Kosovo’s case. It would be beneficial to expand on this section and explain the implications of the legal ruling. For instance, you could discuss how the court's decision influenced international perceptions of Kosovo's independence and how this was a direct strategy to mitigate legal risks. Explaining Risk Management Strategies More Thoroughly: When you refer to "strategic communication and coalition-building," you can provide more details on specific diplomatic strategies employed. Did Ambassador Shabani use direct negotiations with specific countries, or were there broader international summits where he gathered support? Providing these details will make your risk management strategies more tangible and actionable. Linking Risk Management Strategies to Outcomes: After identifying each risk (e.g., geopolitical, legal, or reputational), it would help to directly connect the strategy employed to the outcome achieved. For example, you could explain how Shabani’s engagement in peace-building helped to create a stable diplomatic environment, which ultimately contributed to Kosovo’s recognition by a wider range of countries. Addressing Political Opposition More Directly: While you’ve correctly pointed out geopolitical risks, providing more insight into how Ambassador Shabani specifically managed opposition from countries like Russia and China would be helpful. Did he engage in bilateral talks with these countries? Did he use soft diplomacy tactics to avoid direct confrontation? Adding more details here will clarify how these diplomatic challenges were mitigated. Conclusion Reinforcement: The conclusion ties everything together well, but a stronger reinforcement of how the risk management strategies led to success could make it more impactful. For example, adding a sentence like, “These strategic initiatives, combined with legal victories, ultimately allowed Kosovo to secure greater international legitimacy and stabilize its diplomatic standing” would make the conclusion even stronger. Minor Suggestions: Tone and Language: The tone is formal and professional, but as noted, making it slightly more conversational might improve its readability. For instance, adding direct client-facing phrases like, "Given the current geopolitical landscape, these strategies helped mitigate significant risks," would provide a more engaging tone while maintaining professionalism. Visual Aids: If this is a document that will be presented to a client or an audience, consider adding visuals such as charts, diagrams, or timelines to illustrate key points. For example, a flowchart showing how the legal risks were managed and mitigated through various diplomatic channels would be a powerful addition. Summary: Overall, your transcript offers a strong foundation for understanding the role of risk management in Ambassador Shabani's diplomatic work. By adding more specific examples of risk management frameworks, linking strategies to tangible outcomes, and expanding on certain legal and political aspects, you can elevate the depth and clarity of your analysis. With these refinements, your transcript will not only be more informative but also more persuasive, demonstrating both your expertise and your ability to communicate complex ideas clearly.
By Jomel D B
•Dec 22, 2022
It is a well-written course that is presented by an actual computer forensics expert based on her experience. It provided me with insights to the work of a computer forensic specialist and arming me with the necessary knowledge to prepare me for the career path.
By Puratchi V
•Aug 29, 2021
This course as described provides basic concepts for any beginners who might be interested in this field. Big concepts explained in a easy, clear and concise manner. Content very well presented.
By A P
•Jul 16, 2022
This course are surely gives you benefit for any beginner to intermediate students. The key of success to accomplish this course is just study harder and harder. Then you will get it
By Anhtuyet L
•Nov 2, 2021
Lectures are very detailed with step by steps procedures to satisfy the court's requirements.Learned a lot of new industry standard programs to capture data for evidence.
By Basava P M
•Feb 13, 2022
excellent course enjoyed a lot while learning this course. This course has given me a oppurtunity to learn new concepts related to digital forensics
By Siyabonga P N
•May 2, 2023
I enjoyed the lectures, but most importantly the course was infromative and I have learnt a lot. I am definitely glad I enrolled.
By Deleted A
•Jan 8, 2025
It was short and well made. Everything was compact. The only negative issue is that there was almost no quizzes and assignments.
By Seong H P
•Jul 30, 2022
It was an informative lecture by guiding the general principles of digital forensics and information about networks.
By Ashish R
•Jun 28, 2022
very informative for those , who actually wants to learn what the computer forensics really is.
By 2111BS020073- A
•May 29, 2023
i love this course and its a good explanation and good topic for beginner to advanced.
By neil c b
•Aug 28, 2021
A lot of useful information. I learned a great deal and really enjoyed the course.
By Ravi P C
•Aug 16, 2022
Very well structured course. Provide Basics of Forensics Concept.
By Deepali K
•Feb 15, 2022
it's good to understands concept about digital forensics
By Mohammad A
•Sep 11, 2021
A nice course by a nice instructor on a nice platform.
By Ronald B
•Oct 26, 2022
Very comprehensive, nice array of tools to download.
By Javier A
•Dec 4, 2022
The course is properly Configured and Documented
By David D
•May 2, 2023
Very informative course to learn the basics.