Course curriculum

  • 01

    INTRODUCTION

    • Introduction

  • 02

    SEIZURE

    • Seizure

    • Evidence Seizure - Video

    • Items to Seize at a Scene

    • Phone Identification Lookup - Video

    • Questions To Ask During a Seizure

    • Riley and Wurie - Video

    • Knowledge Check

  • 03

    CONSENT

    • Consent

    • United States v Meador - Video

    • Lemons v State - Video

    • State v. Schutter - Video

  • 04

    WARRANTS

    • What Goes on a Warrant

  • 05

    PRESERVATION

    • Data Preservation

    • Faraday Enclosures/Bags

    • Faraday Bag - Video

    • Information at the Scene and Device Security

    • Device Security

    • Chain of Custody

    • United States v. Finley - Video

    • Knowledge Check

    • Device State

    • Knowledge Check

  • 06

    APPENDICES

    • Appendix I

    • Appendix II

    • Appendix III

    • Appendix V

    • References

Get started now

Learn About How To Maintain Device Integrity

Learning Outcomes

After completing this course, you will learn the following:

  • Learn the importance of Network Isolation

  • Understand different methods for Network Isolation

  • Text length of individual points can be shorter or longer depending on your needs

Technical Requirements

  • In this course all students need is a basic understanding of mobile forensic terminology.

Course Reviews

Samuel Thomson

5 star rating

“Jessica Hyde did a great job educating the rookie practitioner in evidence seizure, preservation and case law. Well Done!”

“Jessica Hyde did a great job educating the rookie practitioner in evidence seizure, preservation and case law. Well Done!”

Read Less

What is next at Cyber 5W?

Add your email to the mailing list to get the latest updates