- Payment Agreement
- › Our Cyber Training Courses
- Advanced Offensive Methodology & Analysis (A-OMA)
- Cyber Leader Course (CLC)
- Cyber Mission Foundations (CMF)
- Digital Forensics & Analysis (DFA)
- Mobile Digital Forensics (MDF)
- Offensive Methodology & Analysis (OMA)
- Windows & Linux Scripting (WLS)
- Windows Exploitation & Analysis (WEA)
- My Account
- Log In
- Class Alerts
- My Courses
Please call to register for this class.
Cost (single seat): $3,000 Course Length: 2 Days
Additional group and government discounts available. Contact Parrot Labs for more information.
What will you get out of MDF?
In this course, you will gain a better understanding of mobile forensics, compare Android and iOS operating systems, apply forensic processes to mobile devices and interpret mobile hacking concepts.
What makes MDF unique?
You’ll perform your exercises and scenarios in a sandboxed network, allowing you to practice and learn at your own pace without affecting other students.
Why should you enroll in MDF?
Mobile Device Forensics teaches you about the inner-workings of the Android and iOS operating systems and thoroughly explains how to safely and effectively perform forensic investigations as you navigate the mobile landscape. Throughout this course, you will:
- Dive deeper into the foundations and inner workings of a mobile device.
- Discover how to apply a forensics-based outlook to every facet of the Android and iOS operating systems.
Begin with the basic concepts of mobility. Topics covered include cell phone channels, codes and protocols, including Long Term Evolution (LTE), Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), Code Division Multiple Access (CDMA), and Global System for Mobile Communications (GSM). You will also learn cellular network technologies, Mobile Components and the components that assist with mobile device identification.
Move onto the Android operating system. Dive into the key features of Android including its interface, applications, memory management, virtual reality and versioning. Then, cover file system and memory partitions, and the background of SQLite files. Then, a brief overview of Android apps before presenting a lengthier segment regarding Android security End this portion by focusing on how to defend against malware, recover forensic data and exploring hacking concepts applicable to the Android operating system.
Explore the iOS platform. After a quick overview, learn the iOS framework, software updates, the boot sequence and file system basics. Included is an in-depth explanation of the iOS file system, where the operating systems files reside and the location of application files. Lastly, learn the OS X file system including the placement of files, OS X standard directories, sandboxed applications and general file “sneakiness”. Included in this portion, is iCloud and how the iOS system identifies the type of content in a file. The course ends with a review of jailbreaking, security and hacking concepts.