Price
$59
Course Type
Online
Duration
3 hours
Date
Various dates throughout the year
Entry Requirements
All Levels

About this course

Welcome to Surviving Digital Forensics training series. If you deal with iPhone evidence then this class is for you. We are going to focus on learning how to deconstruct iOS third party applications. The concept is important to learn because, oftentimes, automated tools will miss this type of evidence or not parse it properly. We first spend some time learning how the evidence is organized and the tools (free or low cost of course!) to use to do it. Once we have become familiar with this we will learn how to break out chat from third party apps and manually connect the dots, convert machine times, translate database so it all makes sense and can be used as evidence. This is not that difficult to do, heck this class is about two hours, so you will be up and deconstructing in no time. Speaking of time, we will also have a special focus on learning how to bulk convert those pesky machine time values using nothing but Excel. So, the next time you pull 100+ chat messages from a third party app database you can quickly bulk translate them into UTC or your local time zone.

As with past SDF classes, the curriculum is split between a brief presentation to go over important points and familiarize you with the process. After that it is all hands on as we learn by doing. Videos will walk you through the process, step-by-step. All the source files for testing are provided.

What are the requirements?

  • Mac or PC (Mac with PC virtual machine preferred)
  • MS Excel (optional for machine time conversion)

What am I going to get from this course?

  • Over 24 lectures and 2 hours of content!
  • Learn how third party apps store their data
  • Learn where evidence files will most likely be within the app's directories
  • Learn what tools to use to examine app data
  • Learn how to identify and interpret chat databases
  • Learn how to bulk convert epoch times into UTC or your local time
  • Learn how to bulk decode chat and call flags, such as sent, received, opened, unopened, etc

What is the target audience?

  • Computer Forensic Analysts
  • IT Professionals
  • Students
Enquire now

Enquire now