Mobile Forensic
Thanks to the rapidly changing landscape of mobile technologies, more and more businesses offering their services on the mobile. The demand for mobile forensics is likely to be driven further by factors like the increasing affordability of smartphones, massive use of the IoT devices and mobile cloud computing.
Even with advanced security, one sees security breach from time-to-time. In order to figure out the trigger behind such a breach, one needs scientific and logical investigative effort. Star Mobile Forensic and Advance Security – SMFAS is one such course that details out the intricacies of forensic investigative techniques for mobile OSs to better their defence against commons threats and attacks. The course helps learners acquire skills like deploying techniques to track hackers, identifying the source of attack, recovering stolen data and much more.
Mobile device forensics is best known for its application to law enforcement investigations, but it is also useful for military intelligence, corporate investigations, private investigations, criminal and civil defense, and electronic discovery.
Audience
Ethical Hacking Expert, Digital Forensics Investigators, Information Security Professionals, Risk Assessments Professionals, Mobile Developers, anyone who deals with implementation, testing, security hardening of mobile devices.
Course Objectives
In this course, you will learn about:
- The threats associated with mobile devices
- Digital forensic concepts: mobile forensics vs. computer forensics
- Mobile evidence types and evidence acquisition types
- Architectural layers of mobile devices
- Gathering evidence during the forensic investigation
- Documenting reports, which can be later used for analysing future threats
- Various mobile forensic tools for investigation
- Reports for future threats/attacks analysis
Course Outcome
After competing this course, you will be able to:
- Understand the fundamentals of digital forensics and explain the need for mobile device forensics
- Understand the threats associated with mobile devices
- Classify evidence types on mobile devices and evidence acquisition types
- Explain different mobile hardware architecture
- Develop a mobile forensics investigation process
- Use various forensic tools for investigation
- Investigate mobile security breaches and identify the criminal
- Restore the data and generate reports for future threats/attacks analysis
Table Of Contents Outline
- Introduction to Digital Forensics
- Introduction to Star Mobile Forensics and Advance Security Expert
- Exploring Mobile Devices and Hardware
- Mobile Forensics VS Computer Forensics
- Process Involved in Mobile Forensics
- Understanding the Mobile OS Architecture
- Threats Associated with the Mobile Devices
- Mobile Security
- Evidence Acquisition and Analysis
- Applying Reverse Engineering on Mobile Software Packages
- Reporting in Mobile Forensics