Cut the Crap
Up in the Clouds
EC-Council Certification Training
Advanced Security Training (CAST)
Other Infosec Training
HH2011 Post Event Report
HH-2012 Post Event Report
Advanced Mobile Hacking & Forensics
Elevating Mobile Forensics & Investigation To An Art Form
Digital Mobile Forensics is fast becoming a lucrative and constantly evolving field, this is no surprise as the mobile phone industry has been witnessing some unimaginable growth, some experts say it may even replace the Computer for those only wishing to send and receive emails.
As this area of digital forensics grow in scope and size due to the prevalence and proliferation of mobile devices and as the use of these devices grows, more evidence and information important to investigations will be found on them. To ignore examining these devices would be negligent and result in incomplete investigations. This growth has now presented new and growing career opportunities for interested practitioners in corporate, enforcement, and military settings.
Mobile forensics is certainly here to stay as every mobile device is different and different results will occur based on that device requiring unique expertise. This course was put together focusing on what today’s Mobile Forensics practitioner requires, some of the advanced areas this course will be covering are the intricacies of manual Acquisition (physical vs. logical) & advanced analysis using reverse engineering , understanding how the popular Mobile OSs are hardened to defend against common attacks and exploits.
Wayne Burke has had considerable hands-on IT Security experience consulting or lecturing, whether it was for Government Agencies, Healthcare Institutions, Financial and international companies.
His experience in the public / defense sectors is equally complemented by assignments undertaken for heavyweight world renowned corporations including Yahoo, Xerox, AT&T and Texas Instruments to name but a few. He is imminently qualified in his field in that he holds a string of professional qualifications in Networking to name a few (MCT, MCSE, Cisco, Network+) and IT Security (CIW-SA, Security+, CEH, ECSA, LPT, CHFI) besides a bachelor’s degree in science.
Wayne is currently the CSO for Sequrit CSI, responsible for the technical realm and security management, which includes consulting teams . He is a captain of a global operating group of penetration testers and security experts. Wayne and his group have delivered security assessments, Penetration Test assignments and customized training for International Corporations and many Government Agencies such as: EPA, FAA, DOJ, DOE, DOD + 8570: Air force, Army, Navy, Marines, FBI and Statewide Law Enforcement Offices in the USA.
In Europe: NATO, Europol, MOD (Military of Defense UK) various EU Law Enforcement, Dutch Ministry of Defense, Ministry of Justice, local European Law Enforcement: UK, Ireland, Switzerland, Belgium, Holland, Denmark.
ASIA: Singapore Gov, Philippines’ Presidential Office, the Undersecretary, and Cyber Crime Police Specialist Unit. Jakarta, Tax Investigations Office. Various Malaysian Gov agencies. Plus Corporate and government bodies from Africa, and numerous Gulf locations to name a few. His office has become his next long haul international flight.
Wayne’s consulting and training undertakings cover specializing in Penetration Testing, Forensics, Security Expert Advisor and secure infrastructure design. His expertise include DMZ firewalls, Secure VPNs, EAP/TLS, PEAP, SSL, PKI, Smart Cards, Biometrics, IPSEC, IDS, Vulnerability Scanners, AV, Honey Pots, Audits, filtering policies, multi-layer encrypted file systems, patch management and deployments. He additionally develops customized and blended security curriculum.
Wayne is constantly engaged in helping businesses optimize their systems security vision He is acknowledged as an expert consultant and trainer serving large organizations with cutting edge IT security. His wide range of all product experience has helped to develop his overall systems security knowledge. Wayne has a passion for tracing malicious hackers in pursuit of which he has had to grapple with issues, which are inextricably entwined in meeting the everyday challenges of information systems security.
Who should attend:
This course is intended for:
Risk Assessment Professionals
Digital Forensics Investigators
Information Security Professionals
Penetration Testers - CEH Professionals
Law Enforcement Officers and Government Agencies
Attorneys, Paralegals and First Responders
Accountants and Financial Personnel
You will Deep Dive into all crucial practical and theoretical aspects of mobile forensics with about 80% of the course focused on practical REAL WORLD hands-on lab scenario exercises.
Pre - requisites
Students should have an understanding of the fundamental principles and processes for digital forensics.
Should have knowledge of evidence acquisitions, examination analysis and final reporting
Digital Forensics experience is recommended.
CHFI certification or equivalent knowledge.
A+ certification or equivalent knowledge.
Network+ certification or equivalent knowledge.
Upon completion of this course, students should achieve proficiency in the following:
Digital forensic fundamentals and legal practices.
Mobile Hardware Design: iPhone, BlackBerry, Android and other devices.
Mobile Software design and the typical boot process for Smart Devices.
Mobile Device Storage and Evidence Acquisition techniques.
Mobile Forensic Hardware and Software Field Kits DIY.
Forensic Software, evidence analysis and reporting.
Cryptography, Steganography, Malware and Password Recovery techniques.
Court approved Non-standard Evidence collection deviations
Final Report: Evidence Documentation.
Module 01: Mobile Hacking and Digital Forensic Challenges
Module 02: Mobile Hardware Design For iPhone, BlackBerry, Android And Other Devices
Module 03: Mobile Software Design And The Common Boot Process For Smart Devices
Module 04: Mobile Device Storage And Evidence Acquisition Techniques
Module 05: Advanced Mobile Attack Analysis
Module 06: Mobile Device Hacking Techniques and Tools
Module 07: Penetration Testing and Exploitation Vectors
Module 08: Mobile Forensic Hardware and Software Field Kits
Module 09: Forensic Software, Evidence Analysis and Reporting
October 26 – 28, 2012
Register and pay by June 30, 2012: $2799
Register and pay by August 31, 2012: $3199
Register and pay after September 1, 2012: $3399
You will get this:
Official CAST Courseware
Complimentary Pass to Hacker Halted conference (Inclusive of Party entrance pass).
Lunch and coffee breaks throughout the duration of the training.
Certificate of Attendance
For full information on course details please click
Copyright 2014 by EC-Council