AX320 Axiom Internet & Cloud Investigations
This course is an intermediate-level four-day training course, designed for participants who are somewhat familiar with the principles of digital forensics and who are seeking to expand their knowledge base into cloud-based and social media forensics. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.
Description
This course is an intermediate-level four-day training course, designed for participants who are somewhat familiar with the principles of digital forensics and who are seeking to expand their knowledge base into cloud-based and social media forensics including Google, Microsoft, Apple, Facebook, Twitter, Instagram, Dropbox, Box, and generic email services. Students will learn multiple techniques in order to acquire data from these services including self-sign in, download your data, warrant returns, and API extractions with Magnet Axiom. This course will leverage Magnet Axiom as well as open-source tools and techniques to improve cloud-based acquisitions and investigations.
What to expect
Hear directly from Jerry Hewitt, a Forensics Trainer at Magnet Forensics, about his previous experience in law enforcement, what his years of experience in the field and within Magnet Forensics helps him accomplish in the classroom, and how our Axiom Internet & Cloud Investigations (AX320) course can help you dive deeper into cloud-based and social media forensics including Google, Microsoft, Apple, Facebook, Twitter, Instagram, Dropbox, Box, and generic email services. Plus, learn more about how you can achieve Magnet Certified Cloud Examiner (MCCE) certification after completing the course.
Course prerequisites
Because AX320 is an intermediate-level course, it is strongly recommended that students first complete Magnet Axiom Examinations. AX200 will provide a thorough understanding of Axiom that will help students focus on the cloud aspect of investigations in AX320. Click Here to find out more about AX200.
Course modules
Module 1: Cloud investigations
- Most investigations do not start directly in the Cloud but instead with a user’s device. Students will learn how to track investigations points left behind on devices including web history, email, installed applications, and sign-ins.
- A methodology will be taught for these types of investigations and when they can be appropriately used.
Module 2: OSINT investigations
- Before diving directly into the protected data, users can gain information on what is publicly available for a suspect or target.
- A workflow of using OSINT or Open-Source Intelligence gathering will be covered as well as proper techniques and popular services to gather this information.
Module 3: Apple
- Apple has cloud-based storage available for multiple pieces of their platform. iCloud Drive and iCloud-stored backups can be a crucial part of an investigation.
- This module will cover iCloud Drive, iCloud Photos, iCloud Backups, and Apple’s “Download your Data” information.
Module 4: Google
- Google powers more than our favorite search-engine, it also has multiple messaging platforms, cloud storage, enterprise solutions, and mountains of web-based storage including web history and passwords.
- We will investigate several of the platforms available from this service including Gmail, Google Drive, and popular data return services known as Google Takeout.
Module 5: Microsoft
- Microsoft has created a cloud platform responsible for syncing information from multiple local services with other devices and with the cloud itself thanks to their OneDrive service.
- This module will cover how to investigate Microsoft accounts found on PCs and how to take that information to what is available on Microsoft’s own servers.
Module 6: Twitter
- Learn how to collect information from Twitter directly—including IP addresses where users have accessed the platform, publicly available “tweets” and connected individuals, as well as retrieving private messages using Magnet Axiom Cloud.
Module 7: Facebook
- This module will cover ways to find activities of Facebook usage on devices, what information can be gathered from Facebook directly, and what information can be gathered from available web scraping through Magnet Axiom to download Facebook data—including wall posts, friends, and messages through Facebook Messenger.
Module 8: Instagram
- Instagram has gone beyond simply a picture-hosting service, to becoming a heavily used chat service platform in the form of Direct Messages (otherwise known as DMs.)
- This module will cover how to collect information that is both public and privately available from this service as well as downloaded photos using both the Magnet Axiom Cloud APIs and publicly available web scrapers.
Module 9: Dropbox
- The amount of data stored in the Cloud goes well beyond simple social media platforms. One of the long-standing services that still remains incredibly popular is the Dropbox service.
- This module will discuss what information can be gathered from Dropbox directly, by requesting information from the providers, and what information can be collected by directly downloading it using Magnet Axiom.
Module 10: Box
- Box, another popular cloud-storage platform, will be investigated. Examiner’s will walk through creating their own cloud accounts for this service, what is available, and how that data can be acquired using tools like Magnet Axiom.
Module 11: Email
- What if the subject or target is running their own email server? Or instead, is using a lesser known service that isn’t covered by the ones mentioned above? In these cases, Magnet Axiom has the ability to directly acquire data from generic POP3 or SMTP services that will be covered in this module as well as how that information can be used in the furtherance of other investigations.
Module 12: Cumulative review
- Using the techniques and information gathered throughout the week, students will finish the investigation that has been worked throughout each separate module.
- The final exercise will feature a scenario on how to investigate cloud-based data utilizing only the information collected from the Cloud.
Additional information
Who should attend: Participants who are unfamiliar with the principles of digital forensics
Advanced preparation: None
Program level: Intermediate-level
Field of study: Computer Software & Applications
Delivery method: Group Internet Based & Group Live
Refunds and Cancellations: Training Course(s) can be rescheduled to a later date or cancelled by either Magnet Forensics or you without charge or penalty if written notice is received twenty-one (21) days or more prior to the date of the Training Course. No rescheduling shall be permitted on less than twenty-one (21) days written notice, which shall constitute a cancellation without a refund. Your written rescheduling or cancellation notice must be emailed to training@magnetforensics.com or contact 202.984.3417. If Magnet Forensics cancels a Training Course due to insufficient attendance, you will have the option to register in a different scheduled Training Course or receive a full refund. Please do not book travel until you have confirmed that the Training Course will be running.
Magnet Forensics is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website:www.nasbaregistry.org.