info@commonwealthtca.com
Language  
English
French
Spanish
German
Italian
Russina
Arabic
Turkish
Home
Courses
Cities
Associations
Services
About Us
Contact Us
Course Category
Accounting and Finance
Administration and Secretarial
Auditing and Governance, Risk and Compliance
Banking, Insurance and Financial Services
Business Continuity and Crisis Management
Communication and Writing Skills
Construction Management
Contracts Management
Customer Service
Data Management and Business Intelligence
Digital Innovation and Transformation
Energy and Water Management
Financial Technology (FinTech)
Health, Safety and Environment
Human Resources and Training
Interpersonal Skills and Self Development
IT Management
Leadership and Management
Legal
Maintenance and Engineering
Marketing and Sales
Monetary Economics
Monitoring and Evaluation
Oil and Gas
Planning and Strategy Management
Port and Shipping Management
Procurement and Supply Chain Management
Project Management
Public Relations
Quality and Productivity
Security Management
Tourism Management
Transport and Logistics
More Links
Public Training Courses
Certified Training Courses

Mobile Forensics Expert

Why Attend

This course is designed for forensic investigation professionals and deals with Mobile forensics. The course assumes a prerequisite knowledge of computer security and digital data structures as well as the legal aspects of admissibility of evidence in court. It covers the essentials of Mobile File Structures, Data Extraction, Analysis and Reporting. This course will teach investigators the tools and techniques to perform Mobile Data Extraction, Mobile Data Analysis and Evidence Reporting on different mobile devices.

Overview

Course Outline

Schedule & Fees

Course Methodology

Instructor-led training that uses interactive learning methods, including class discussion, small group activities, and role-playing

Course Objectives

The essentials of Mobile File Structures, Data Extraction.; Analysis and Reporting For data extraction.; Understanding of the tools and techniques to perform Mobile Data Extraction, Mobile Data Analysis.; Evidence Reporting on different mobile devices.

Target Audience

This course is designed for: Ethical Hacking Expert.; Digital Forensics Investigators.; Information Security Professionals.; Risk Assessments Professionals.; Mobile Developers.; anyone who deals with implementation, testing, security hardening of mobile devices.

Target Competencies

n/a

Day 1

Forensic Acquisition of Smartphones

  • Logical Acquisition

  • File System Acquisition

  • Physical Acquisition

  • Advanced Methods

Android Forensics

  • Android Architecture

  • Android Components

  • NAND Flash Memory in Android Devices

  • Android File System Overview

Day 2

Android File System Structures

  • Data Structure Layout

  • Physical

  • File system

  • Logical

  • Data Storage Formats

  • Physical and Logical Keyword Searches

Retrieving User Activity Information from Android Devices

  • Android Applications

  • Data Structures on Android Smartphones

  • SMS / MMS

  • Calls, Contacts, and Calendars

  • E-mail and Web Browsing

  • Location Information

  • Third-Party Applications

  • Retrieving Deleted SQLite Records

  • Retrieving Deleted Data from Raw Images on Android Devices

Day 3

Handling Locked Android Devices

  • Security Options on Android

  • Methods for Bypassing Locked Android Devices

  • Bypassing Android Security and Encryption

iOS (iPhone) Forensics

  • iOS Architecture

  • iOS Components

  • NAND Flash Memory in iOS Devices

  • iOS File Systems

  • iOS Versions

  • iOS Encryption

Day 4

OS File System Structures

  • Data Structure Layout

  • Physical

  • File System

  • Logical

  • Data Storage Formats

  • Physical and Logical Keyword Searches

iOS Evidentiary Locations

  • Primary Evidentiary Locations

  • Unique File Recovery

  • Parsing SQLite Database Files

  • Manual Decoding of iOS Data

Day 5

Retrieving User Activity Information iOS Devices

  • iOS Applications

  • Deep Dive into Data Structures on iOS Devices

  • SMS / MMS

  • Calls, Contacts, and Calendar

  • E-mail and Web Browsing

  • Location Information

  • Third-Party Applications

  • Retrieving Deleted SQLite Records

  • Retrieving Deleted Data from Raw Images

Handling Locked iOS Devices

  • Security Options on iOS

  • Current Acquisition Issues

  • Bypassing iOS Security

$3875

Cairo

Country: Egypt

Duration: One week

Date: 08–12 Sep 2025

Register

$3275

Beijing

Country: China

Duration: One week

Date: 20–24 Apr 2026

Register