Ec-council | Learning
Advanced Training in Mobile Forensics
Master mobile science: smartphone analysis, powerful tools and advanced Android investigations with Android Debugging Bridge.
About Certified Mobile Forensics Course
Course outline
I. Different mobile operating systems
a. iOS
b. Android
c. Windows
II. Methods of judicial analysis
a. Scientific approach
b. Legal issues
III. Mobile networks
a. 3G
b. 4G
c. 5G
V. Coverage of the MobileEdit judicial analysis
VI. BlackBag Judicial Analysis Coverage
VII. Covering Android Judicial Analysis with ADB
VIII. Overview of JTAG
Who should attend
This training is useful for any forensic investigator, but it is particularly interesting for those trying to track data leaks, financial crimes and cybercrime-related crimes. This workshop includes practical laboratories.
Objectives of the course
Objectives of the course
This workshop is designed to dive students into the telephone forensic. It covers: the essential elements of iOS and Android, the various mobile networks, mobile network devices and telephone towers, as well as how to extract evidence from a phone.
- Key issues affecting the world of information security, piracy methodologies and frameworks, information security controls, and information security laws and standards.
- The different types of information gathering (footprinting), collection tools and associated countermeasures.
- Network scan techniques and countermeasures for these scans.
- Enumeration techniques and enumeration countermeasures.
- The different types of vulnerability assessment and the tools used for these assessments.
- System hacking methodology.
- The different types of malware (troyal horses, viruses, worms, etc.), advanced persistent attacks (APT) and fileless malware, malware analysis procedure and corresponding countermeasures.
- The various sniffing techniques and their countermeasures.
- Social engineering techniques, identity theft and countermeasures.
- Denial-of-service attack techniques (DoS/DDoS), botnets, DDoS attack tools, and countermeasures against such attacks.
- Sessional diversion techniques and associated countermeasures.
- Escape techniques of firewalls, IDS, IPS, honeypots, NAC and termination points, escape tools and countermeasures.
- Different types of attacks against web servers, web applications and web APIs, hacking methodologies and tools, as well as corresponding countermeasures.
- SQL injection attacks, injection methodology, escape techniques and countermeasures against SQL injection.
- Various types of wireless encryption, threats and methods of wireless piracy, tools of piracy and Wi-Fi security, as well as countermeasures.
- The vector of attack on mobile platforms, hacking on Android and iOS, mobile device management, mobile security guidelines and security tools.
- Different types of attacks on IoT (Internet of Things) and OT (operational technologies), piracy methodologies and tools, as well as countermeasures.
- Various cloud computing technologies, cloud threats and attacks, hacking methodology (including for AWS, Microsoft Azure, Google Cloud and container piracy) and associated security techniques and tools.
- Different types of encryption algorithms, cryptographic tools, cryptographic applications, cryptographic attacks and cryptographic tools.
- Ethical hacking driven by artificial intelligence.
Certification Club
This training is useful for any forensic investigator, but it is particularly interesting for those trying to track data leaks, financial crimes and cybercrime-related crimes. This workshop includes practical laboratories.


