Course curriculum

  • 01

    INTRODUCTION

    • Introduction

  • 02

    SEIZURE

    • Seizure

    • Evidence Seizure - Video

    • Items to Seize at a Scene

    • Phone Identification Lookup - Video

    • Questions To Ask During a Seizure

    • Riley and Wurie - Video

    • Knowledge Check

  • 03

    CONSENT

    • Consent

    • United States v Meador - Video

    • Lemons v State - Video

    • State v. Schutter - Video

  • 04

    WARRANTS

    • What Goes on a Warrant

  • 05

    PRESERVATION

    • Data Preservation

    • Faraday Enclosures/Bags

    • Faraday Bag - Video

    • Information at the Scene and Device Security

    • Device Security

    • Chain of Custody

    • United States v. Finley - Video

    • Knowledge Check

    • Device State

    • Knowledge Check

  • 06

    APPENDICES

    • Appendix I

    • Appendix II

    • Appendix III

    • Appendix V

    • References

Get started now

Learn About How To Maintain Device Integrity

Learning Outcomes

After completing this course, you will learn the following:

  • Learn the importance of Network Isolation

  • Understand different methods for Network Isolation

  • Text length of individual points can be shorter or longer depending on your needs

Technical Requirements

  • In this course all students need is a basic understanding of mobile forensic terminology.

What is next at Cyber 5W?

Add your email to the mailing list to get the latest updates