Skip links

Ec-council | Learning

Advanced Training in Mobile Forensics

Master mobile science: smartphone analysis, powerful tools and advanced Android investigations with Android Debugging Bridge.

About Certified Mobile Forensics Course

Course outline

I. Different mobile operating systems
a. iOS
b. Android
c. Windows

II. Methods of judicial analysis
a. Scientific approach
b. Legal issues

III. Mobile networks
a. 3G
b. 4G
c. 5G

V. Coverage of the MobileEdit judicial analysis

VI. BlackBag Judicial Analysis Coverage

VII. Covering Android Judicial Analysis with ADB

VIII. Overview of JTAG

Who should attend

This training is useful for any forensic investigator, but it is particularly interesting for those trying to track data leaks, financial crimes and cybercrime-related crimes. This workshop includes practical laboratories.

Objectives of the course

Objectives of the course

This workshop is designed to dive students into the telephone forensic. It covers: the essential elements of iOS and Android, the various mobile networks, mobile network devices and telephone towers, as well as how to extract evidence from a phone.

  • Key issues affecting the world of information security, piracy methodologies and frameworks, information security controls, and information security laws and standards.
  • The different types of information gathering (footprinting), collection tools and associated countermeasures.
  • Network scan techniques and countermeasures for these scans.
  • Enumeration techniques and enumeration countermeasures.
  • The different types of vulnerability assessment and the tools used for these assessments.
  • System hacking methodology.
  • The different types of malware (troyal horses, viruses, worms, etc.), advanced persistent attacks (APT) and fileless malware, malware analysis procedure and corresponding countermeasures.
  • The various sniffing techniques and their countermeasures.
  • Social engineering techniques, identity theft and countermeasures.
  • Denial-of-service attack techniques (DoS/DDoS), botnets, DDoS attack tools, and countermeasures against such attacks.
  • Sessional diversion techniques and associated countermeasures.
  • Escape techniques of firewalls, IDS, IPS, honeypots, NAC and termination points, escape tools and countermeasures.
  • Different types of attacks against web servers, web applications and web APIs, hacking methodologies and tools, as well as corresponding countermeasures.
  • SQL injection attacks, injection methodology, escape techniques and countermeasures against SQL injection.
  • Various types of wireless encryption, threats and methods of wireless piracy, tools of piracy and Wi-Fi security, as well as countermeasures.
  • The vector of attack on mobile platforms, hacking on Android and iOS, mobile device management, mobile security guidelines and security tools.
  • Different types of attacks on IoT (Internet of Things) and OT (operational technologies), piracy methodologies and tools, as well as countermeasures.
  • Various cloud computing technologies, cloud threats and attacks, hacking methodology (including for AWS, Microsoft Azure, Google Cloud and container piracy) and associated security techniques and tools.
  • Different types of encryption algorithms, cryptographic tools, cryptographic applications, cryptographic attacks and cryptographic tools.
  • Ethical hacking driven by artificial intelligence.

Certification Club

This training is useful for any forensic investigator, but it is particularly interesting for those trying to track data leaks, financial crimes and cybercrime-related crimes. This workshop includes practical laboratories.

The most comprehensive Mobile Forensics package on the market!

the MF, which includes the following:

Online course for one year

Examination voucher

Official laboratories for 6 months

Preparation for examination

This website uses cookies to improve your web experience.
EnglishenEnglishEnglish
0