AX350 Axiom macOS Examinations

AX350 is an expert-level four-day training course, designed for participants who understand digital forensics fundamentals, basic Axiom usage, and are seeking to expand their forensic investigative skills targeting Mac computers. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

Description

AX350 is an expert-level four-day training course, designed for participants who understand digital forensics fundamentals, basic Axiom usage, and are seeking to expand their forensic investigative skills targeting Mac computers.

Students will investigate a scenario involving network and computer intrusions, data theft, and distribution of stolen data, including possible attempts to market the stolen data via the dark web. The four-day course will take the student from receipt of initial information to the on-scene response, ending with the laboratory phase of artifact analysis and reporting.

Topics covered include live box triage and acquisition, dead box preview and acquisition, encryption remediation, case processing and examination, and both forensic and investigative analysis.

Course prerequisites

Because AX350 is an expert-level course, it is strongly recommended that students first complete Magnet Axiom Examinations (AX200). AX200 will provide a thorough understanding of Axiom that will help students focus on the Macintosh based forensic artifacts and investigations in AX350. Click Here to find out more about AX200

Course modules

Module 1: Course introduction and Magnet Axiom installation

An introduction as to what to expect throughout the course for students as well as an overview of Axiom, its system requirements, and installation information.

Module 2: Course scenario and macOS overview

Dual focus areas in this module include a detailed training scenario that will set the stage for the course and provide investigative guidance for the duration of the training week and an overview of Mac computing to level-set students regardless of their experience with Apple products. Learn about the macOS operating system and APFS file system, including boot considerations, Mac desktop orientation, APFS internals, property lists, Unix paths, Mac search and indexing, Apple virtual assistant, and backups.

Module 3: Mac first responder

Discuss activities and decisions that are part of initial investigation involving Mac computers, including addressing non-removable media, T2 chips, physical connectivity to a target Mac, user-level access, RAM acquisition, encryption awareness, live box triage, and dead box preview.

Module 4: Mac acquisition and processing

Discuss tools, methods, and options for forensically acquiring Mac digital evidence including internal and external data storage devices, methods for defeating encryption, recovering passwords and recovery keys, and processing Mac evidence with Axiom.

Module 5: System analysis of macOS/APFS

Mac system analysis includes the physical, logical, file system, and application layers of the digital storage device model. Focus areas include the macOS operating system, rebuilt desktop, network interfaces and hosts, USB connections and devices, mobile device backups, system logs, and more.

Module 6: User accounts

Areas of focus related to user accounts include both local user accounts and internet accounts. Local accounts that are active on the system, those accounts with administrator-level rights, permissions, and privileges, and deleted accounts are all explored. Apple cloud accounts, mobile device owner accounts, as well as account passwords and tokens are also included.

Module 7: Intrusion and unauthorized access

Digital forensics is increasingly about incident response. This module will cover artifacts pertaining to threat actors and their methods of obtaining unauthorized access to computers and networks, however the techniques used are equally applicable to most other digital forensic examinations. Artifact areas include the Safari web browser, media files, documents, and others that may be useful to establish the computer investigated was used in an intrusion event. Tools and methods commonly used to gain and exploit access are covered, including Metasploit, Zenmap/nmap, secure shell, and file transfer protocol. Students will use a method of timeline analysis to help the evidence tell the story it wants to tell.

Module 8: File analysis and corroboration

File analysis is used to investigate stolen files, data, and other intellectual property as well as corroboration of any preliminary investigation that was done prior to the forensic examination stage including information received from confidential sources and other witnesses. Areas of focus include cloud file storage and sharing, printer artifacts, local file access artifacts, instant messaging, email, and local encrypted archives.

Module 9: Backups and removable devices

Mac backups are often found on removable devices and working evidence found on removable devices associated with a Mac computer potentially present the investigative team with new or corroborative evidence. Areas of focus include extended attributes, Mac antimalware and protection systems, and leveraging media analysis in Axiom.

Module 10: Investigative conclusions and final reports

This module is a compendium of small investigators notes that are scattered throughout the training material calling out new investigative facts as they are learned. Gathered in one module, the investigators notes present a form of narrative that details the investigation from beginning to end. Students can also generate a final Axiom report they can take with them for future review. The content of this module, together with a comprehensive Axiom case report, can help students recall the lessons learned during class to use as a guide during real world investigations. Because investigators notes tie directly back to the relevant training modules, students who successfully complete this course can conduct future investigations with more confidence through reinforcement and do not have to simply rely on their ability to memorize what was discussed in class.

 

Additional information

Who should attend: Participants who are unfamiliar with the principles of digital forensics
Advanced preparation: None
Program level: Advanced-level
Field of study: Computer software & applications
Delivery Method: Group internet based & group live

Refunds and Cancellations: Training Course(s) can be rescheduled to a later date or cancelled by either Magnet Forensics or you without charge or penalty if written notice is received twenty-one (21) days or more prior to the date of the Training Course. No rescheduling shall be permitted on less than twenty-one (21) days written notice, which shall constitute a cancellation without a refund. Your written rescheduling or cancellation notice must be emailed to training@magnetforensics.com or contact 202.984.3417. If Magnet Forensics cancels a Training Course due to insufficient attendance, you will have the option to register in a different scheduled Training Course or receive a full refund. Please do not book travel until you have confirmed that the Training Course will be running.

Magnet Forensics is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website:www.nasbaregistry.org.

Interested in private training or hosting a training class?

Similar courses

GK200 is an intermediate-level four-day training course, designed for participants who are familiar with the principles of digital forensics and are seeking to expand their knowledge base into iOS and Android examinations using Magnet Graykey. Students must be part of a law enforcement agency and must be cleared in advance to attend this course.

More Information

This is an advanced level course designed for students who are familiar with the principles of digital forensics and use Magnet Axiom in Windows investigations. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

More Information

This course is an expert-level four-day training course, designed for participants who are familiar with the principles of digital forensics and who are seeking to improve their mobile device investigations. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

More Information

Magnet Axiom Examinations (AX200) is ideal for those who require intermediate-level training with a digital investigation platform that covers cases involving smartphones, tablets, computers, and cloud data in a single collaborative interface. This course is the perfect entry point for examiners who are new to Axiom. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

More Information

AX310 is an expert-level four-day training course, designed for participants who are familiar with the principles of digital forensics and who are seeking to expand their knowledge base on advanced forensics and incident response techniques and want to improve computer investigations. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

More Information

This course is an intermediate-level four-day training course, designed for participants who are somewhat familiar with the principles of digital forensics and who are seeking to expand their knowledge base into cloud-based and social media forensics. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

More Information

This course is an expert-level four-day training course, designed for participants who are somewhat familiar with the principles of digital forensics and who are seeking to expand their knowledge base on advanced forensics and improve their computer investigations. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

More Information

This course is an intermediate-level two-day training course, designed for participants who are familiar with the principles of digital forensics and who are seeking to expand their knowledge base into deep iOS and android file system examinations. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

More Information

Forensic Fundamentals (AX100) is a beginner-level course, designed for participants who are unfamiliar with the principles of digital forensics. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

More Information

Digital Video Investigations with Magnet Witness (DV200) is a beginner-level course, designed for participants who are not yet familiar with the concepts of the recovery and analysis of digital video files from commercially available digital video recorders.

More Information

Magnet Axiom to Cyber Transitions is ideal for those who are looking to continue their education and transition into the unique features of Axiom Cyber after taking the Axiom Examinations (AX200) course.

More Information

Magnet Axiom Examination (AX200 Microlearning) is ideal for those who are relatively new to forensics and want to learn how to utilize Axiom to get the most out of the forensic platform. Axiom is a platform that covers cases involving mobile device, computer, and cloud data in a single collaborative interface. Students will learn the workflows of how to interrogate and investigate devices containing digital media.

More Information

Core Mobile Acquisition and Analysis (AX150) is a beginner level course, designed for participants who are unfamiliar with the principles of mobile forensics. The course focuses on iOS and Android devices from the point of collection to the point of analysis whilst exploring Magnet Axiom and Magnet tools such as Magnet Acquire, the Magnet Custom Artifact Generator (MCAG) and Magnet Axiom Dynamic App Finder.

More Information

Core Mobile Acquisition and Analysis (AX150 Microlearning) is a beginner level course, designed for participants who are unfamiliar with the principles of mobile forensics. The course focuses on iOS and Android devices from the point of collection to the point of analysis whilst exploring Magnet Axiom and Magnet tools such as Magnet Acquire, the Magnet Custom Artifact Generator (MCAG) and Magnet Axiom Dynamic App Finder.

More Information

Magnet Axiom Advanced Mobile Forensics (AX300 Microlearning) details the use of Magnet Axiom’s advanced mobile analysis capabilities. Students will learn advanced analysis techniques and leverage Magnet Axiom Examine to become proficient in investigating advanced aspects of full file system extractions of both iOS and Android devices.

More Information

The Magnet Griffeye Examinations Course is a 3-day training course designed for students who have attended the Magnet Griffeye Lite online course or have already attained proficiency in Magnet Griffeye Advanced. The course is designed to equip you with the necessary skills and tools to handle media files effectively during a criminal investigation, thereby maximizing the productivity of the tool.

More Information

Magnet Verakey Examinations (VK200) is an intermediate-level four-day training course, designed for participants who are familiar with the principles of digital forensics and who are seeking to improve their mobile device investigations.

More Information

Magnet Axiom’s Portable Case is a lightweight version of the full capabilities found in Axiom—designed for easy access and analysis of forensic findings. It shares the ability to investigate the case data from digital devices and produce reports with non-technical stakeholders, such as investigators and attorneys.

More Information

Magnet Griffeye Lite is a limited, free version of Griffeye offered to law enforcement officials to navigate digital media more efficiently. In this free tutorial, available in numerous 20-minute-or-less modules, attendees will see how they can make the most out of their use of Griffeye Lite, including how to use the software, applying searching and filtering techniques, as well as creating reports and exporting.

More Information

This two-day instructor-led course provides students with the knowledge and skills necessary to perform structural comparative analysis on digital image and video files and to articulate expert results in both a report and court of law. Students will learn how to manually decode multimedia files at the binary level, performing authentication examinations using file metadata and structure. We will be working within Magnet Verify.

More Information

This 3-day course starts with training in detailed binary analysis of digital multimedia files, specifically focusing on the most common formats, i.e., ISO BMFF (MP4, MOV, 3GP, 3G2, M4V) and RIFF (AVI). Building from this foundational skillset, the course continues with a focus on troubleshooting video files with H264 encoded video, specifically focused on AVCC implementations of H264 encoding in ISO BMFF files.

More Information

This course is a two-day, expert-level training program designed to equip digital forensic examiners with advanced skills for navigating complex mobile data. Emphasizing unsupported third-party applications, advanced data structures, and custom artifact creation, this course will provide essential tools for analyzing mobile device data with confidence.

More Information

Get exam-ready with our certification prep materials.

More Information

This course is designed for individuals who have completed the Magnet Griffeye Lite course. It will provide the skills and tools needed to process cases, manage media files, and utilize the collaborative features of the tool, allowing multiple examiners to work together on a single case and enhancing the overall productivity of the tool.

More Information