Get 1 Free Month of Skillshare Shop Here

IT Piracy Investigation Course

by Brenden Burgess

When you buy through links on our site, we may earn a commission at no extra cost to you. However, this does not influence our evaluations.

  • Forensics of the mobile device
  • Android and iOS architectural and start -up process
  • Mobile legal medicine process
  • Study the data from the cellular network
  • File system acquisition
  • Telephone locks, rooting and jailbreaking of mobile devices
  • Logical acquisition on mobile devices
  • Physical acquisition of mobile devices
  • Android and iOS medico-legal analysis

Labs:

  • Examine an Android image file and deleted sculpture files.

Key subjects covered:

Forensics of mobile devices, Owasp Top 10 Mobile Risk, Android OS architecture, IOS architecture, mobile legal medicine process, Android crusions process, iOS criminalic process, cellular sites, Android file system, iOS file system, bypassing Android devices locked, access to root files in Android, Logical, acquisition of cloud data on and iOS arrangements, JT acquisition, JT acquisition on JT devices, JTA Forensics, flashing boxes, Static analysis and dynamic analysis of the Android package kit (APK), Android news analysis tools, Whatsapp artefact collection from Android peripherals, analysis of Safari iOS iOS keychain and iOS medico-legal analysis.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

AI Engine Chatbot
AI Avatar
Hi! I'm Learnopoly’s AI Course Advisor. What would you like to learn today?