As a proven industry leader, Belkasoft has remained at the forefront of innovation when forensically acquiring mobile device data, while safely bypassing security constraints using the latest techniques.
This course will provide students with the tools needed to perform forensic analysis of Apple iOS and Google Android mobile devices from within the BEC platform.
The BEC platform provides a comprehensive toolset for the examiner to locate artifacts from mobile devices including:
• Call Logs
• Pictures and Video
• Internet-based data
• Browser content
• App data and SQLite databases
During Instructor-led course activities, and exercises - participants will demonstrate the ability to efficiently analyze digital artifacts acquired from mobile devices while utilizing BEC.
Module 1 - Introduction 1 Hour
This module will provide a brief history of Belkasoft followed by overview of course logistics enabling instructors and students to become familiar with one another and their professional experiences in digital forensics.
Module 2 – Mobile Device Acquisitions 3 hours
Students will understand how to properly identify and forensically acquire Apple iOS and Google Android mobile devices using the BEC platform.
Module 3 – Understanding Apple iOS Artifacts 2 Hours
Instructors will guide students through an overview of the Apple iOS platform and discuss specific artifacts from these devices that are pertinent to most investigations.
Module 4 – Understanding Google Android Artifacts 2 Hours
Instructors will guide students through an overview of the Google Android platform and discuss specific artifacts from these devices that are pertinent to most investigations.
Module 5 – Mobile Device Examinations 4 hours
Students will understand how to analyze forensic acquisitions and mobile backups from iOS and Android devices for pertinent artifacts from within the BEC platform.
Module 6 – Final Practical 3.5 Hours
Students will work to complete a comprehensive practical scenario to demonstrate the ability to analyze mobile artifacts forensically acquired from multiple devices from within the BEC platform.
Module 7 – BEC Reporting 1.0 Hour
Instructors will guide students on the importance of reporting and techniques on how to utilize the BEC platform to create effective forensic reports on findings.
The BEC certification course design, objectives, practical exercises, and scenarios are written based on over fifteen years of field experience from working with LE officers and CCU examiners both international and domestic. The techniques taught in this course – while based on BEC functionality and workflow – have been curated from extensive research, testing, and use on live systems involved in actual cyber crimes investigated around the world where DSI examiners were actively involved as contracted analysts, instructors, and/or mentors.
Digital Shield, Incorporated (DSI) is dedicated to assist in the response, discovery, analysis, mitgation and tracking of cyber incidents as they occur within commercial and government entities. Digital Shield Security Professionals have extensive backgrounds in conducting forensic examinations, mobile device forensics, log analysis, network and physical security vulnerability assessments, and Certification and Accreditation requirements.
DSI Security Professionals are prior Law Enforcement Officers, both local and federal, prior military and security engineers in large Corporations. DSI Security Professionals have extensive experience additionally with International Investigations and have assisted government and commercial entities in areas such as North America, South America, Asia, Africa, Europe and the Middle East. All DSI security professionals hold a Top Secret Clearance or higher.
Claim the event and start manage its content.I am the organizer
A place to meet the most active, international community members