AX300 Axiom Advanced Mobile Forensics
This course is an expert-level four-day training course, designed for participants who are familiar with the principles of digital forensics and who are seeking to improve their mobile device investigations. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.
Description
This course details the use of Magnet Axiom’s advanced mobile analysis capabilities. Students will learn advanced analysis techniques and leverage Magnet Axiom Examine to become proficient in investigating advanced aspects of full file system extractions of both iOS and Android devices.
These modules of instruction will build the participants ability to understand more advanced concepts of iOS and Android, including advanced media analysis, pattern of life artifacts including Biomes, 3rd party application analysis and social media platforms. This will be conducted using analysis of multiple different file types including system logs, plist files and Sqlite databases.
What to expect
Hear directly from Justin Almanza, a Forensics Trainer at Magnet Forensics, about Magnet Forensics training courses specifically designed to help you in your mobile investigations, including Core Mobile Acquisition & Analysis (AX150), Axiom Advanced Mobile Forensics (AX300), and Graykey Examinations (GK200).
Course prerequisites
Because AX300 is an expert-level course, it is recommended that students first complete Magnet Axiom Examinations (AX200). AX200 will provide a thorough understanding of Axiom that will help students focus on the mobile part of investigations in AX300. Click Here to find out more about AX200.
Course modules
Module 1: Course introduction
- Meet the instructor and other students while seeing what’s expected for the week.
- Install Magnet Axiom and other open-source tools and files that are needed for the course completion.
- A discussion of mobile evidence handling considerations, the current state of mobile forensics, and the history of mobile device extraction types.
Module 2: iOS system artifacts
- Learn about the iOS/iPadOS file system, including the structure and the different file types that developers use to store system and application related data.
- Understand how to track device wipes/device migrations
- Learn how to conduct advanced media analysis of iOS devices, including how to track files across iCloud services and files related to third party applications.
- Learn how Axiom can be used to investigate system related artifacts including Apple Health, Apple CarPlay and iCloud.
Module 3: iOS pattern of life analysis
- Gain knowledge of system related artifacts such as KnowledgeC, Biomes and Powerlog, that can contribute to pattern of life analysis.
- Learn how to manually examine these artifacts, and validate how Axiom is presenting pattern of life artifacts.
- Understand how to apply Axiom features such as Timeline to enhance the analysis of pattern of life artifacts.
- Other services such as AirDrop will also be explored, exploring how to track files sent and received via the AirDrop service.
Module 4: iOS application analysis
- Understand how to establish what applications are installed on a device, including when they have been installed.
- Learn how to evaluate what permissions have been granted to applications and how this helps to build a profile of a particular application.
- Gain knowledge of how iOS applications store their data, including an understanding of containers and shared areas within the file system.
- The iOS Files application will be discussed in depth here, including methodologies to track files stored locally on the device, as well as files stored within iCloud.
Module 5: Social media & messaging on iOS
- Students will gain an understanding of how more popular social media and messaging applications on iOS devices are storing their data.
- More common social media and messaging applications such as Discord, WhatsApp and Snapchat will be explored.
- Develop an understanding of the volatility of these types of applications and how to apply an investigative methodology to allow manual analysis for potentially unsupported applications.
Module 6: Android system artifacts
- Learn how to gather key information about Android devices, including general device information and Android users.
- Develop an understanding of more advanced secure features such as Secure Folder and how Axiom can be used to investigate data from these types of secure containers.
- Learn about and discuss common artifacts such as SMS messaging, web browser data, email data and application activity.
- Understand Android media directories, including file types such as Motion Photos.
- Learn how to track device wipes on Android and understand how Axiom presents device wipe artifacts.
Module 7: Android application analysis
- Learn how to identify installed applications on Android devices, as well as its associated information such as granted permissions.
- Develop an understanding of Google Play artifacts in Axiom, and how they can be used to provide more information relating to installed applications.
- Establish knowledge surrounding manual examination of directories within the Android file system in order to understand how to examine data from potentially unsupported applications.
- Understand Android media directories, including file types such as Motion Photos.
- File manager applications such as Google Files will also be discussed in this module, where students will understand how these types of application can provide valuable insight into the usage of an Android device.
Module 8: Social media and messaging on Android
- This module will focus on common social media and messaging applications found on Android devices. Students will understand the volatility of the structure of these types of applications.
- Students will gain an understanding of how more popular social media and messaging applications on Android devices are storing their data.
- More common social media and messaging applications such as Facebook Messenger, WhatsApp and Signal will be examined.
Additional information
Who should attend: Participants who are unfamiliar with the principles of digital forensics
Advanced preparation: None
Program level: Advanced-level
Field of study: Computer software & applications
Delivery method: Group internet based & group live
Refunds and cancellations: Training Course(s) can be rescheduled to a later date or cancelled by either Magnet Forensics or you without charge or penalty if written notice is received twenty-one (21) days or more prior to the date of the Training Course. No rescheduling shall be permitted on less than twenty-one (21) days written notice, which shall constitute a cancellation without a refund. Your written rescheduling or cancellation notice must be emailed to training@magnetforensics.com or contact 202.984.3417. If Magnet Forensics cancels a Training Course due to insufficient attendance, you will have the option to register in a different scheduled Training Course or receive a full refund. Please do not book travel until you have confirmed that the Training Course will be running.
Magnet Forensics is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website:www.nasbaregistry.org.