Mobile Forensics


Course Description

Mobile Forensics is fast becoming a lucrative and constantly evolving field, this is no surprise as the mobile phone industry has been witnessing some unimaginable growth, some experts say it may even replace the Computer for those only wishing to send and receive emails. As this area of digital forensics grow in scope and size due to the prevalence and proliferation of mobile devices and as the use of these devices grows, more evidence and information important to investigations will be found on them. To ignore examining these devices would be negligent and result in incomplete investigations. This growth has now presented new and growing career opportunities for interested practitioners in corporate, enforcement, and military settings. Mobile forensics is certainly here to stay as every mobile device is different and different results will occur based on that device requiring unique expertise. .

This course was put together focusing on what today’s Mobile Forensics practitioner requires, some of the advanced areas this course will be covering are the intricacies of manual Acquisition (physical vs. logical) & advanced analysis using reverse engineering, understanding how the popular Mobile OSs are hardened to defend against common attacks and exploits

Target Audience

  • Security Professionals
  • Ethical Hackers
  • Penetration Testert
  • Technology Evangelist
  • Forensic Investigator
  • Anyone who is interested in Mobile Forensics

Course Key Highlights

  • Steps of Mobile Forensic
  • Mobile File System and Architecture
  • Pin or Pattern Password Bypass and Cracking for Forensics
  • Data Extraction and Recovery
  • SIM Data Recovery
  • Mobile and SIM Cloning

Course Duration

  • 24 Hours

Course Content

  • Introduction of Mobile Forensic
  • What is Mobile Forensic?
  • Why Mobile Forensic?
  • Mobile Forensics Background
  • Major Steps of Mobile Forensic
  • Mobile Forensic Search and Seizure Process
  • Big Challenges in Mobile Forensic
  • Cases in Which Mobile is Involved
  • Terrorist and Criminals Mobile Market
  • Mobile File System and Architecture (Android, Blackberry, iPhone, Samsung etc.)
  • Pin or Pattern Password Bypass and Cracking for Forensics
  • Mobile Data Extraction Without USB Debugging
  • Mobile Modified Data Forensics
  • Retrieve All Important Data with a Physical Acquisition
  • Examine the Phone Data
  • Phone Data Extraction and Recovery (Android, Blackberry, iPhone, Samsung etc.)
  • Mobile Device & Memory Card Recovery Services
  • SIM Data Recovery Methods
  • Mobile and SIM Cloning
  • Data Extraction from Mobile Clones
  • Mobile Data Recovery through Open Source Tools
  • Reporting and Exporting Mobile Data in File Format etc.