Security and forensic analysis of mobile devices
A one-day training course focusing on security and forensic analysis of mobile devices. The program covers device security techniques, forensic analysis methods and data recovery. Participants will learn practical aspects through workshops and exercises on real cases.
Issues
-
Mobile systems
-
Mobile forensics
-
Data extraction
-
Artifact analysis
-
Investigative tools
-
Mobile security
-
Evidence management
-
Investigative documentation
-
Legal aspects
-
Forensics standards
-
Data recovery
-
Best practices of analysis
Benefits
- Ability to secure mobile devices
- Knowledge of forensic analysis techniques
- Competence in data recovery
- Knowledge of investigative tools
- Ability to document evidence
- Ability to create reports
Who is this training for?
Prerequisites
- Basic knowledge of mobile systems
- Knowledge of IT security issues
- Understanding the legal aspects
- Experience in data analysis
Training program
Mobile systems architecture
- Threats and vulnerabilities
- Security mechanisms
- Device management
- Forensic analysis techniques
Securing devices
- Data extraction
- Artifact analysis
- Information Retrieval
- Tools and methodologies
- Forensics software
Test procedures
- Documentation of evidence
- Standards of analysis
Legal aspects
- Regulations
Chain of custody
- Investigative reports
- Cooperation with authorities
Delivery Methods
Online
- Convenience of participating from anywhere
- Interactive live sessions with trainer
- Materials available for 30 days
- No travel costs
On-site
- Direct contact with trainer and group
- Intensive hands-on workshops
- Networking with other participants
- Full focus on learning
Frequently asked questions
What are the prerequisites for this training?
For Security and forensic analysis of mobile devices we recommend: Basic knowledge of mobile systems; Knowledge of IT security issues; Understanding the legal aspects.
What is the format and duration of this training?
The training lasts 1 day and is available in online and on-site format. Sessions run from 9:00 AM to 4:00 PM. We can also customize the schedule to fit your team's needs.
Who is this training designed for?
This training is designed for: Forensics specialists; Security analysts; Digital Investigators.
Request a quote
Funding Options
Check funding options for your company
Development Services Database
Up to 80% funding for SMEs from EU funds
Check availabilityNational Training Fund
Up to 100% funding for employers
Learn moreTrusted by
We train teams at Poland's largest companies
Interested in this training?
Contact us - we'll prepare an offer tailored to your organization's needs.