18 - 22 Aug 2025
London (UK)
Hotel : Landmark Office Space - Oxford Street
Cost : 6000 € Euro
This course is designed for forensic investigation professionals and deals with Mobile forensics. The course assumes a prerequisite knowledge of computer security and digital data structures as well as the legal aspects of admissibility of evidence in court. It covers the essentials of Mobile File Structures, Data Extraction, Analysis and Reporting. This course will teach investigators the tools and techniques to perform Mobile Data Extraction, Mobile Data Analysis and Evidence Reporting on different mobile devices.
This training will focus on:
The essentials of Mobile File Structures, Data Extraction.
Analysis and Reporting For data extraction.
Understanding of the tools and techniques to perform Mobile Data Extraction, Mobile Data Analysis.
Evidence Reporting on different mobile devices.
This course is designed for:
Ethical Hacking Expert.
Digital Forensics Investigators.
Information Security Professionals.
Risk Assessments Professionals.
Mobile Developers.
anyone who deals with implementation, testing, security hardening of mobile devices.
The course assumes a prerequisite knowledge of computer security and digital data structures as well as the legal aspects of admissibility of evidence in court.
Day 1
Forensic Acquisition of Smartphones
Logical Acquisition
File System Acquisition
Physical Acquisition
Advanced Methods
Android Forensics
Android Architecture
Android Components
NAND Flash Memory in Android Devices
Android File System Overview
Day 2
Android File System Structures
Data Structure Layout
Physical
File system
Logical
Data Storage Formats
Physical and Logical Keyword Searches
Retrieving User Activity Information from Android Devices
Android Applications
Data Structures on Android Smartphones
SMS / MMS
Calls, Contacts, and Calendars
E-mail and Web Browsing
Location Information
Third-Party Applications
Retrieving Deleted SQLite Records
Retrieving Deleted Data from Raw Images on Android Devices
Day 3
Handling Locked Android Devices
Security Options on Android
Methods for Bypassing Locked Android Devices
Bypassing Android Security and Encryption
iOS (iPhone) Forensics
iOS Architecture
iOS Components
NAND Flash Memory in iOS Devices
iOS File Systems
iOS Versions
iOS Encryption
Day 4
OS File System Structures
Data Structure Layout
Physical
File System
Logical
Data Storage Formats
Physical and Logical Keyword Searches
iOS Evidentiary Locations
Primary Evidentiary Locations
Unique File Recovery
Parsing SQLite Database Files
Manual Decoding of iOS Data
Day 5
Retrieving User Activity Information iOS Devices
iOS Applications
Deep Dive into Data Structures on iOS Devices
SMS / MMS
Calls, Contacts, and Calendar
E-mail and Web Browsing
Location Information
Third-Party Applications
Retrieving Deleted SQLite Records
Retrieving Deleted Data from Raw Images
Handling Locked iOS Devices
Security Options on iOS
Current Acquisition Issues
Bypassing iOS Security