This course is designed to prepare students to conduct mobile forensic analysis. This course will cover fundamentals of mobile forensics including timestamp analysis, SIM card analysis, and device preservation. The course will then look at Android, iOS, and legacy device analysis.
We at Hexordia will provide a methodology for conducting analysis of unsupported 3rd party apps and conduct comparative analysis. This course uses all open-source tools and publicly available forensic images to teach concepts through the combined use of lecture, demos, hands-on exercises, and labs. Students will also receive access to all HEX-100 and 200 series courses for 1 year when taking this course. By completing this training, students are prepared to take the exam that leads to the Hexordia Mobile Forensic Analyst (HMFA) certification.
Live Online Training: Instructor (40 hour) | Materials | Certification Exam
All sessions starts from 8:30 AM to 5 PM (Eastern Time) or upon a mutual agreement
HEX-110 Mobile Forensics Fundamentals Part 1
HEX-111 Mobile Forensic Fundamentals Part 2
HEX-120 Mobile Timestamp Fundamentals
HEX-130 SIM Analysis
HEX-140 Creating Mobile Test Data
HEX-150 Mobile Device Preservation
HEX-210 Android Analysis
HEX-214 Google Takeout Forensics
HEX-215 Android Location Forensics
HEX-220 iOS Analysis
HEX-225 iOS Location Forensics
HEX-240 Legacy Phone Analysis
HEX-250 Mobile Analysis Methodology and 3rd Party App Parsing
HEX-270 Comparative Analysis
Jessica Hyde is an experienced forensic examiner in both the government and commercial sectors. She is the founder of Hexordia, a digital forensics contracting organization and Adjunct Professor teaching Mobile Forensics in the graduate program at George Mason University, where she achieved an MS in Computer Forensics. She is also involved in several community efforts including Associate Editor for the Forensic Science International: Digital Investigations Journal, Chair of DFIR Review, International 2nd VP of the High Tech Crime Investigation Association, and a member of the advisory board for Cyber Sleuths Lab. Her previous roles include Director of Forensics at Magnet Forensics, performing forensic examinations as a Sr. Mobile Exploitation Analyst for Basis Technology, Senior at EY, and Senior Electrical Engineer at American Systems. Jessica is also proud to be a veteran of the United States Marine Corps.
Understand different types of forensic images available from mobile devices
Understand critical elements of seizure of a mobile device
Decode common mobile timestamps by hand or with the use of freeware tools
Properly handle and analyze data from SIM cards
Know how to create mobile test data sets
Conduct analysis of Android, iOS, and legacy devices to include geolocation and system artifacts
Identify and analyze unsupported 3rd party applications from mobile devices
Conduct comparative analysis
This course is intended for students with or without prior experience in digital forensics. There are no prerequisites.
This training is designed for anyone who wants to learn more about mobile forensics. This may include current forensic examiners as well as those with an interest in the field. No formal training in digital or mobile forensics is required.
1. Any computer with an internet connection capable of watching live stream video, will be able to view the live lectures in this class.
2. We recommend system with a latest Intel/AMD CPU, 8 GB of RAM, 250 GB of disk space, and an Internet connection should be sufficient to work through our labs.
3. Some tools are Windows only; however, if you have Windows VM, that will work.
Full refunds will be provided up to 14 days before the course start date. You are allowed to change the course schedule up to 10 days before the course starts.
“Excellent delivery from Jessica, using open source tools only. The learning platform is easy to follow and the interactive sessions are fun to attend.”
“Excellent delivery from Jessica, using open source tools only. The learning platform is easy to follow and the interactive sessions are fun to attend.”→Read Less