Infinity Forensics

You are here:

MOBILE DEVICE FORENSICS INVESTIGATION

Mobile device forensics is a rapidly evolving field, creating exciting opportunities for practitioners in corporate, criminal, and military settings. Mobile phones facilitate everything from voice/video calls to text messaging, web surfing, shopping and GPS navigation, music player, video recording and image/video editing. More memory is being added to mobile phones, which makes their storage capacity greater than ever. As a result, they also provide rich data and evidence for legal investigations. Call records logs, texts messages, video, internet surfing log, GPS log files and pictures help with cases ranging from ethics investigations to murder prosecutions. Mobile forensics professionals recover mobile phone evidence so that law enforcement agencies and lawyers can build or defend against cases. As with any forensic science, mobile forensics requires various technical and legal training.

This course is designed for students who are both new to and already familiar with computer forensic and especially mobile device forensics, this hands on course provides the core knowledge and skills that a Digital Forensic Investigator needs to process cell phones, PDAs, and other mobile devices.

By using mobile forensics tools, you will learn how to forensically preserve, acquire and examine data stored on mobile devices and utilize the results for any kind of civil/criminal investigation. This course covers techniques and tools in the context of an overall mobile forensic methodology, providing you with the ability to obtain and utilize digital evidence on mobile devices.

What you will learn:

This course covers techniques and tools in the context of an overall mobile forensic methodology, providing you with the ability to perform forensic investigation on mobile devices to investigate and solve problems.

  • Gain insights into forensic investigation
  • Learn how to set up preventive measures
  • Learn to identify various mobile forensics techniques other red flags
  • Real-life case studies of cyber criminals and know what makes them tick
  • Sharing of techniques, checklists and flowcharts
  • Practical problems and case studies

Course Outline:

Introduction

  • Purpose and Scope
  • Electronic crimes and mobile phones
  • Mobile Phone characteristics
  • Mobile Phone as evidence

Overview of Subscriber Identify Modules (SIM)

  • Structure
  • Evidence location
  • Forensics SIM clone

Overview of mobile phone handsets

  • Data Storage
  • Evidence Location
  • Physical & Logical

Evidence Collection

  • Seizuring Evidence
  • Handling Evidence

Extraction Techniques

  • MicroRead extraction
  • Manual extraction
  • Logical extraction
  • Physical extraction
  • Decoding extraction
  • Hex dump

Examination, Analysis and documentation

  • Data carving
  • Chain of custody

Forensics Tools

  • SIM card tools
  • External and Internal Memory
  • SIM card cloning
  • Password recovery

Must Attend:

This Class is specifically designed for key decision makers in both government agencies ad private sectors:

  • Senior officers from government & not-for- profit sector
  • GMs, Profit-Centre Managers who have assumed security/IT
  • Auditors who need to build deeper technical skills
  • Penetration tester and Ethical hackers
  • Corporate Attorneys / Legal Professionals
  • Engineers / Technical Managers
  • Product & Marketing Managers
  • IT manager
  • Security supervisor