Mobile Forensic
Thanks to the rapidly changing landscape of mobile technologies, more and more businesses
offering their services on the mobile. The demand for mobile forensics is likely to be driven
further by factors like the increasing affordability of smartphones, massive use of the IoT
devices and mobile cloud computing.
Even with advanced security, one sees security breach from time-to-time. In order to figure out
the trigger behind such a breach, one needs scientific and logical investigative effort.
Star
Mobile Forensic and Advance Security – SMFAS is one such course that details out
the intricacies
of forensic investigative techniques for mobile OSs to better their defence against commons
threats and attacks. The course helps learners acquire skills like deploying techniques to track
hackers, identifying the source of attack, recovering stolen data and much more.
Mobile device forensics is best known for its application to law enforcement investigations, but
it is also useful for military intelligence, corporate investigations, private investigations,
criminal and civil defense, and electronic discovery.
Audience
Beginner to Intermediate
Course Objectives
In this course, you will learn about:
- The threats associated with mobile devices
- Digital forensic concepts: mobile forensics vs. computer forensics
- Mobile evidence types and evidence acquisition types
- Architectural layers of mobile devices
- Gathering evidence during the forensic investigation
- Documenting reports, which can be later used for analysing future threats
- Various mobile forensic tools for investigation
- Reports for future threats/attacks analysis
Course Outcome
After competing this course, you will be able to:
- Understand the fundamentals of digital forensics and explain the need for mobile device forensics
- Understand the threats associated with mobile devices
- Classify evidence types on mobile devices and evidence acquisition types
- Explain different mobile hardware architecture
- Develop a mobile forensics investigation process
- Use various forensic tools for investigation
- Investigate mobile security breaches and identify the criminal
- Restore the data and generate reports for future threats/attacks analysis
Table Of Contents Outline
- Introduction to Digital Forensics
- Introduction to Star Mobile Forensics and Advance Security Expert
- Exploring Mobile Devices and Hardware
- Mobile Forensics VS Computer Forensics
- Process Involved in Mobile Forensics
- Understanding the Mobile OS Architecture
- Threats Associated with the Mobile Devices
- Mobile Security
- Evidence Acquisition and Analysis
- Applying Reverse Engineering on Mobile Software Packages
- Reporting in Mobile Forensics
More Software Certification