Course Curriculum
-
01
INTRODUCTION
-
Introduction
-
-
02
SEIZURE
-
Seizure
-
Evidence Seizure - Video
-
Items to Seize at a Scene
-
Phone Identification Lookup - Video
-
Questions To Ask During a Seizure
-
Riley and Wurie - Video
-
-
03
CONSENT
-
Consent
-
United States v Meador - Video
-
Lemons v State - Video
-
State v. Schutter - Video
-
Knowledge Check
-
-
04
WARRANTS
-
What Goes on a Warrant
-
-
05
PRESERVATION
-
Data Preservation
-
Faraday Enclosures/Bags
-
Faraday Bag - Video
-
Information at the Scene and Device Security
-
Device Security
-
Chain of Custody
-
United States v. Finley - Video
-
Knowledge Check
-
Device State
-
Knowledge Check
-
-
06
APPENDICES
-
Appendix I
-
Appendix II
-
Appendix III
-
Appendix V
-
References
-
Learning Outcomes
After completing this course, you will learn the following:
-
Learn the importance of Network Isolation
-
Understand different methods for Network Isolation
-
Text length of individual points can be shorter or longer depending on your needs
Technical Requirements
-
In this course all students need is a basic understanding of mobile forensic terminology.
What is next at Cyber 5W?
Add your email to the mailing list to get the latest updates