PLEASE NOTE: THIS IS THREE SESSION WEBINAR THAT AIRS LIVE ON OCTOBER 23, 24 AND 25, FROM 12-2 PM EASTERN EACH DAY. YOUR REGISTRATION ALSO GIVES YOU ACCESS TO RECORDINGS OF THE LIVE SESSIONS FOR 30 DAYS ONCE THE LIVE SESSIONS HAVE ENDED.
As investigators and examiners, the vast majority of our cases involve mobile devices. Our victims, actors and witnesses carry smartphones and tablets that track their activities, communications and travel. And the data that we retrieve from these devices can be crucial in bringing our investigations to the proper conclusion.
At PATCtech, we firmly believe that a single tool approach to forensics is entirely insufficient. There is a myriad of tools available to assist us in conducting thorough, effective and efficient examinations of mobile devices. Each has its strengths and its weaknesses, but together they constitute a powerful arsenal for us.
Join us September 25-27 and get a first-hand demonstration of several of our favorite forensic tools, including Secure View and APEX, Oxygen Forensic Detective, CelleBrite Physical Analyzer, and Belkasoft Evidence Center.
Day One: We will explore how our tools create data extractions from our mobile devices. We will discuss the different types of extractions, and what each will include. Both software extraction utilities and hardware devices (such as CelleBrite’s UFED Touch II and Susteen’s DataPilot 10) will be explored. We will also discuss rooting of Android devices to allow a more thorough physical extraction.
Day Two: We will dive into the Graphical User Interfaces (GUI) of our tools. Our tools all have extensive capabilities when it comes to parsing out useful data from our cellular devices. But they all also have very different user interfaces. We will demonstrate the types of data our tools can natively parse, the way they present this data to us, and some of the built-in analytical tools each has.
Day Three: Although our software developers do a great job of keeping up with current popular applications, it is simply impossible for them to support all of the millions of apps available to our users. It is inevitable that you will encounter a device whose user is communicating, navigating, socializing or creating content with an app that our tools will not natively support. The good news is that our tools all have built-in capabilities that allow us to go under the hood of our mobile device and manually examine these unsupported apps. This is definitely a lot more than push-button forensics!
During the webinar, instruction will be given on how to download a copy of the instructor’s PowerPoint as well as additional resource materials pertaining to the topic.