Description
Course TopicsMalware and Spyware on SmartphonesMobile devices in incident-response casesDetermining if malware or spyware existHandling the isolation of the malwareDecompiling malware to conduct in-depth analysisDetermining what has been compromisedForensic Analysis of Smartphones and Their ComponentsAndroidiOSSD cardsCloud-based backups and storageCloud-synced data – Google and moreDevices that have intentionally been modified – deleting, wiping, and hiding applicationsDeep-Dive Forensic Examination of Smartphone File Systems and Data StructuresRecovering deleted information from smartphonesExamining SQLite databases in-depthFinding traces of user activities on smartphonesRecovering data from third-party applicationsTracing user online activities on smartphones (e.g., messaging and social networking)Examining application files of interestManually decoding to recover missing data and verify resultsDeveloping SQL queries to parse databases of interestUnderstanding the user-based and smartphone-based artifactsLeveraging system and application usage logs to place the device in a location and state when applications were useIn-Depth Usage and Capabilities of the Best Smartphone Forensic ToolsUsing your tools in ways you didn’t know were possibleLeveraging custom scripts to parse deleted dataLeveraging scripts to conduct forensic analysisCarving dataDeveloping custom SQL queriesConducting physical and logical keyword searchesManually creating timeline generation and link analysis using information from smartphonesTool validation based on trusted datasetsUsing geolocation information from smartphones and smartphone components to place a suspect at a location when an artifact was createdHandling Locked and Encrypted DevicesExtracting evidence from locked smartphonesBypassing encryption (kernel and application level)Cracking passcodesDecrypting backups of smartphonesDecrypting third-party application filesExamining encrypted data from SD cardsIncident Response Considerations for SmartphonesHow your actions can alter the deviceHow to handle Hot and Cold devicesHow to prevent remote access on the deviceHow to tie a user or activity to a device at a specific timeHow mobile device management can hurt as much as help you
Reviews
There are no reviews yet.