AX320 Axiom Internet & Cloud Investigations

This course is an intermediate-level four-day training course, designed for participants who are somewhat familiar with the principles of digital forensics and who are seeking to expand their knowledge base into cloud-based and social media forensics. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

Description

This course is an intermediate-level four-day training course, designed for participants who are somewhat familiar with the principles of digital forensics and who are seeking to expand their knowledge base into cloud-based and social media forensics including Google, Microsoft, Apple, Facebook, Twitter, Instagram, Dropbox, Box, and generic email services. Students will learn multiple techniques in order to acquire data from these services including self-sign in, download your data, warrant returns, and API extractions with Magnet Axiom. This course will leverage Magnet Axiom as well as open-source tools and techniques to improve cloud-based acquisitions and investigations.

What to expect

Hear directly from Jerry Hewitt, a Forensics Trainer at Magnet Forensics, about his previous experience in law enforcement, what his years of experience in the field and within Magnet Forensics helps him accomplish in the classroom, and how our Axiom Internet & Cloud Investigations (AX320) course can help you dive deeper into cloud-based and social media forensics including Google, Microsoft, Apple, Facebook, Twitter, Instagram, Dropbox, Box, and generic email services. Plus, learn more about how you can achieve Magnet Certified Cloud Examiner (MCCE) certification after completing the course.

Course prerequisites

Because AX320 is an intermediate-level course, it is strongly recommended that students first complete Magnet Axiom Examinations. AX200 will provide a thorough understanding of Axiom that will help students focus on the cloud aspect of investigations in AX320. Click Here to find out more about AX200.

Course modules

Module 1: Cloud investigations

  • Most investigations do not start directly in the Cloud but instead with a user’s device. Students will learn how to track investigations points left behind on devices including web history, email, installed applications, and sign-ins.
  • A methodology will be taught for these types of investigations and when they can be appropriately used.

Module 2: OSINT investigations

  • Before diving directly into the protected data, users can gain information on what is publicly available for a suspect or target.
  • A workflow of using OSINT or Open-Source Intelligence gathering will be covered as well as proper techniques and popular services to gather this information.

Module 3: Apple

  • Apple has cloud-based storage available for multiple pieces of their platform. iCloud Drive and iCloud-stored backups can be a crucial part of an investigation.
  • This module will cover iCloud Drive, iCloud Photos, iCloud Backups, and Apple’s “Download your Data” information.

Module 4: Google

  • Google powers more than our favorite search-engine, it also has multiple messaging platforms, cloud storage, enterprise solutions, and mountains of web-based storage including web history and passwords.
  • We will investigate several of the platforms available from this service including Gmail, Google Drive, and popular data return services known as Google Takeout.

Module 5: Microsoft

  • Microsoft has created a cloud platform responsible for syncing information from multiple local services with other devices and with the cloud itself thanks to their OneDrive service.
  • This module will cover how to investigate Microsoft accounts found on PCs and how to take that information to what is available on Microsoft’s own servers.

Module 6: Twitter

  • Learn how to collect information from Twitter directly—including IP addresses where users have accessed the platform, publicly available “tweets” and connected individuals, as well as retrieving private messages using Magnet Axiom Cloud.

Module 7: Facebook

  • This module will cover ways to find activities of Facebook usage on devices, what information can be gathered from Facebook directly, and what information can be gathered from available web scraping through Magnet Axiom to download Facebook data—including wall posts, friends, and messages through Facebook Messenger.

Module 8: Instagram

  • Instagram has gone beyond simply a picture-hosting service, to becoming a heavily used chat service platform in the form of Direct Messages (otherwise known as DMs.)
  • This module will cover how to collect information that is both public and privately available from this service as well as downloaded photos using both the Magnet Axiom Cloud APIs and publicly available web scrapers.

Module 9: Dropbox

  • The amount of data stored in the Cloud goes well beyond simple social media platforms. One of the long-standing services that still remains incredibly popular is the Dropbox service.
  • This module will discuss what information can be gathered from Dropbox directly, by requesting information from the providers, and what information can be collected by directly downloading it using Magnet Axiom.

Module 10: Box

  • Box, another popular cloud-storage platform, will be investigated. Examiner’s will walk through creating their own cloud accounts for this service, what is available, and how that data can be acquired using tools like Magnet Axiom.

Module 11: Email

  • What if the subject or target is running their own email server? Or instead, is using a lesser known service that isn’t covered by the ones mentioned above? In these cases, Magnet Axiom has the ability to directly acquire data from generic POP3 or SMTP services that will be covered in this module as well as how that information can be used in the furtherance of other investigations.

Module 12: Cumulative review

  • Using the techniques and information gathered throughout the week, students will finish the investigation that has been worked throughout each separate module.
  • The final exercise will feature a scenario on how to investigate cloud-based data utilizing only the information collected from the Cloud.

Additional information

Who should attend: Participants who are unfamiliar with the principles of digital forensics
Advanced preparation: None
Program level: Intermediate-level
Field of study: Computer Software & Applications
Delivery method:  Group Internet Based & Group Live

Refunds and Cancellations: Training Course(s) can be rescheduled to a later date or cancelled by either Magnet Forensics or you without charge or penalty if written notice is received twenty-one (21) days or more prior to the date of the Training Course. No rescheduling shall be permitted on less than twenty-one (21) days written notice, which shall constitute a cancellation without a refund. Your written rescheduling or cancellation notice must be emailed to training@magnetforensics.com or contact 202.984.3417. If Magnet Forensics cancels a Training Course due to insufficient attendance, you will have the option to register in a different scheduled Training Course or receive a full refund. Please do not book travel until you have confirmed that the Training Course will be running.

Magnet Forensics is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website:www.nasbaregistry.org.

Interested in private training or hosting a training class?

Similar courses

Forensic Fundamentals (AX100) is a beginner-level course, designed for participants who are unfamiliar with the principles of digital forensics. Magnet Forensics Training is hosted in a variety of time zones. Prior to registration, please confirm the time zone for the class you wish to register in. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

More Information

GK200 is an intermediate-level four-day training course, designed for participants who are familiar with the principles of digital forensics and are seeking to expand their knowledge base into iOS and Android examinations using Magnet Graykey. Students must be part of a law enforcement agency and must be cleared in advance to attend this course.

More Information

This course is an expert-level four-day training course, designed for participants who are somewhat familiar with the principles of digital forensics and who are seeking to expand their knowledge base on advanced forensics and improve their computer investigations. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

More Information

This course is an expert-level four-day training course, designed for participants who are familiar with the principles of digital forensics and who are seeking to improve their mobile device investigations. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

More Information

Magnet Axiom Examinations (AX200) is ideal for those who require intermediate-level training with a digital investigation platform that covers cases involving smartphones, tablets, computers, and cloud data in a single collaborative interface. This course is the perfect entry point for examiners who are new to Axiom. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

More Information

AX310 is an expert-level four-day training course, designed for participants who are familiar with the principles of digital forensics and who are seeking to expand their knowledge base on advanced forensics and incident response techniques and want to improve computer investigations. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

More Information

This course is an expert-level four-day training course, designed for participants who are somewhat familiar with the principles of digital forensics and who are seeking to expand their knowledge base on macOS and the forensic analysis of devices using the APFS file system and AXIOM. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

More Information

This course is an expert-level four-day training course, designed for participants who are somewhat familiar with the principles of digital forensics and who are seeking to expand their knowledge base on advanced forensics and improve their computer investigations. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

More Information

This course is an intermediate-level two-day training course, designed for participants who are familiar with the principles of digital forensics and who are seeking to expand their knowledge base into deep iOS file system examinations. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

More Information

Forensic Fundamentals (AX100) is a beginner-level course, designed for participants who are unfamiliar with the principles of digital forensics. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

More Information

Digital Video Investigations with Magnet Witness (DV200) is a beginner-level course, designed for participants who are not yet familiar with the concepts of the recovery and analysis of digital video files from commercially available digital video recorders.

More Information

Magnet Axiom to Cyber Transitions is ideal for those who are looking to continue their education and transition into the unique features of Axiom Cyber after taking the Axiom Examinations (AX200) course.

More Information

Magnet Axiom Examination (AX200 Microlearning) is ideal for those who are relatively new to forensics and want to learn how to utilize Axiom to get the most out of the forensic platform. Axiom is a platform that covers cases involving mobile device, computer, and cloud data in a single collaborative interface. Students will learn the workflows of how to interrogate and investigate devices containing digital media.

More Information

Core Mobile Acquisition and Analysis (AX150) is a beginner level course, designed for participants who are unfamiliar with the principles of mobile forensics. The course focuses on iOS and Android devices from the point of collection to the point of analysis whilst exploring Magnet Axiom and Magnet tools such as Magnet Acquire, the Magnet Custom Artifact Generator (MCAG) and Magnet Axiom Dynamic App Finder.

More Information

Core Mobile Acquisition and Analysis (AX150 Microlearning) is a beginner level course, designed for participants who are unfamiliar with the principles of mobile forensics. The course focuses on iOS and Android devices from the point of collection to the point of analysis whilst exploring Magnet Axiom and Magnet tools such as Magnet Acquire, the Magnet Custom Artifact Generator (MCAG) and Magnet Axiom Dynamic App Finder.

More Information

Magnet Axiom Advanced Mobile Forensics (AX300 Microlearning) details the use of Magnet Axiom’s advanced mobile analysis capabilities. Students will learn advanced analysis techniques and leverage Magnet Axiom Examine to become proficient in investigating advanced aspects of full file system extractions of both iOS and Android devices.

More Information

The Magnet Griffeye Examinations Course is a 3-day training course designed for students who have attended the Magnet Griffeye Lite online course or have already attained proficiency in Magnet Griffeye Advanced. The course is designed to equip you with the necessary skills and tools to handle media files effectively during a criminal investigation, thereby maximizing the productivity of the tool.

More Information

Digital Video Investigations with DVR Examiner (DV200) is a beginner-level course, designed for participants who are not yet familiar with the concepts of the recovery and analysis of digital video files from commercially available digital video recorders.

More Information

Magnet Verakey Examinations (VK200) is an intermediate-level four-day training course, designed for participants who are familiar with the principles of digital forensics and who are seeking to improve their mobile device investigations.

More Information

Magnet Axiom’s Portable Case is a lightweight version of the full capabilities found in Axiom—designed for easy access and analysis of forensic findings. It shares the ability to investigate the case data from digital devices and produce reports with non-technical stakeholders, such as investigators and attorneys.

More Information

Magnet Griffeye Lite is a limited, free version of Griffeye offered to law enforcement officials to navigate digital media more efficiently. In this free tutorial, available in numerous 20-minute-or-less modules, attendees will see how they can make the most out of their use of Griffeye Lite, including how to use the software, applying searching and filtering techniques, as well as creating reports and exporting.

More Information

This course will prepare students to use Medex in complex authenticity or file origin cases and provide expert opinion testimony in court. Students will gain foundational knowledge of how digital video is encoded and stored in order to provide an expert analysis of it. It will also focus on the use of Medex in performing complex authentication examinations of digital video (including deepfake videos) as well as identifying the source of unknown video files.

More Information