Mobile Phone Extractions & Analysis

The perfect start into Mobile Forensics

  • Handling of different mobile devices and solving problems related to them (> 60 different smartphones)
  • A training from seizing a mobile device to creating a report
  • Continuous update of contents, depending on market developments

Why should you attend this training?

The optimal handling of common mobile forensic toolkits, as well as the handling of seized digital evidence, is essential to solve problems sucessfully in the investigational process. The Mobile Phone Extractions & Analysis training offers prospective forensic experts the best possible introduction to Mobile Forensics. The strong application-oriented focus and the demonstrations with real cases give participants ideal preparation for performing a successful investigation.

The Mobile Phone Extractions & Analysis training teaches participants to extract various mobile devices, as well as to analyse and interpret these extractions.

Depending on customers’ specific requirements, training contents can be slightly adapted.

 

HIGHLIGHTS:

  • Basic Mobile Phone Technology
  • Common Encoding Types
  • Mobile Device Seizure
  • Extractions of Mobile Devices with Cellebrite UFED
  • Examination of Mobile Devices
  • Physical Analyzer
  • Evaluation of TImestamps
  • Location Data
  • Hex Search Techniques
  • App Virutalization
The training includes:
  • Demo smartphones
  • Exercises with solutions
  • Exams
  • Certificates
  • Participant guide with detailed description of all training content (includes step-by-step instruction and examples)

The training contents can be adapted to your personal requirements.

If you have further questions, feel free to contact us: office@t3k.ai or +43 1 997 10 33.

Mobile Phone Extractions & Analysis Training

Die ersten Schritte für Einsteiger & Grundlagen der Mobilforensik

SQLite Forensics for Smartphones

Gewinnung zusätzlicher Informationen aus Datenbanken

The Salafi-Jihadi Ecosystem: Interrogating the Datasets

Erhalten Sie Einsicht in Mechanismen extremistischer Netzwerke