SANS FOR585 (2015) Audio

SANS FOR585 (2015) Audio
English | Size: 1.96 GB
Category: Security

FOR585: Advanced Smartphone Forensics
Contents | Additional Info
Instructor: Heather Mahalik
36 CPEs
Laptop Required
Every day there are so many great bits of real-world knowledge. It isn’t just academic. Mind blowing experience.
Bart Dudek
This was an awesome class! Amazing amount of material and the capstone tied it all together.
D. Mayer, Broomsfield Police Department
It is almost impossible today to conduct a digital forensic investigation that does not include a smartphone or mobile device. Smartphones are replacing the need for a personal computer, and almost everyone owns at least one. The smartphone may be the only source of digital evidence tracing an individual’s movements and motives, and thus can provide the who, what, when, where, why, and how behind a case. FOR585: Advanced Smartphone Forensics teaches real-life, hands-on skills that help digital forensic examiners, law enforcement officers, and information security professionals handle investigations involving even the most complex smartphones currently available.

The course focuses on smartphones as sources of evidence, providing students with the skills needed to handle mobile devices in a forensically sound manner, manipulate locked devices, understand the different technologies, discover malware, and analyze the results for use in digital investigations by diving deeper into the file systems of each smartphone. Students will be able to obtain actionable intelligence and recover and analyze data that commercial tools often miss for use in internal investigations, criminal and civil litigation, and security breach cases. Students will walk away with knowledge they can immediately put to use on their next smartphone investigation.

FOR585: Advanced Smartphone Forensics you will learn:
Smartphone Capabilities: Determine the who, what, when, where, why, and how of a case. Who used a smartphone? What did the user do on a smartphone? Where was the smartphone located at key times? What online activities did the user conduct using a smartphone, and when?
How to Recover Deleted Data: Use manual decoding techniques to recover deleted data stored on smartphones and mobile devices.
How to Detect Data Stored in Third-Party Applications: Who did the user communicate with using a smartphone and why are these activities sometimes hidden?
How to Detect Malware: Detect smartphones compromised by malware using forensics methods.
How to Bypass Locks: Bypass, crack, and/or decode lock codes manually recovered from smartphones, including cracking iOS backup files that were encrypted with iTunes.

About WoW Team

I'm WoW Team , I love to share all the video tutorials. If you have a video tutorial, please send me, I'll post on my website. Because knowledge is not limited to, irrespective of qualifications, people join hands to help me.