Тёмный

Interested in Smartphone Forensics? 

SANS Digital Forensics and Incident Response
Подписаться 71 тыс.
Просмотров 8 тыс.
50% 1

Have you considered enrolling in FOR585, or are you concerned that there is a prerequisite to taking Smartphone Analysis In-Depth? The webcast will address some of the key aspects that are covered in FOR585, as well as brush up on some of the common forensic terminology that is used throughout the material to get you up to speed when you enter the classroom on Day 1. Topics include: forensic terminology as it relates to smartphones, a sneak peek at the 585 SIFT VM, a smartphone acquisition overview, and a preview of some of the artifacts that this course will assist you in uncovering and interpreting.
To learn more about #FOR585 or to register visit: sans.org/FOR585
Speaker Bio
Domenica "Lee" Crognale
Domenica is one of the course co-authors of SANS FOR585: Advanced Smartphone Forensics. She has been working in digital forensics for more than 10 years and specializing in mobile devices since 2009. In previous jobs she has provided training to military and government agencies, worked on high-profile cases, tested and validated various mobile forensics utilities, and provided security assessments for many mobile applications. In her day job, she spends time dissecting third-party mobile applications, where there is no shortage of interesting data left behind. She maintains multiple certifications including the GASF, EnCE, CCE, and CISSP. @domenicacrognal

Наука

Опубликовано:

 

7 июл 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 5   
@venessariley3285
@venessariley3285 11 месяцев назад
I worked with a mobile phone forensics expert from Eclipse Forensics they are amazing at their job!
@nickytaylor7532
@nickytaylor7532 2 года назад
What if the device has Google Advanced Protection Program? Would Google's Advanced Protection contribute towards forensics in any way by collaborating with Google without rooting the device?, considering that the device’s owner's Security Certificate of Google's Advanced Protection may be compromised after rooting that device for forensics means.
@TheUballe
@TheUballe 4 года назад
Very nice!
@olivierjeanniard6738
@olivierjeanniard6738 2 года назад
Is jailbreaking on an Ios iphone compatible with forensic expertise because we add elements to the phone to analyze?
@aug39
@aug39 4 года назад
Do you teach any threat modeling development? I was more interested in the threat-modeling methods that have been developed. These methods are highly effective at finding security flaws in product designs, and have been incorporated into the Security Development Lifecycle. They can be combined to create a more robust and well-rounded view of potential threats. Not all of them are comprehensive; some are abstract and others are people-centric. Some methods focus specifically on risk or privacy concerns.
Далее
아이스크림으로 체감되는 요즘 물가
00:16
Strawberry Cat?! 🙀 #cat #cute #catlover
00:42
Просмотров 6 млн
Webinar: An Introduction to Mobile Forensics
40:53
Просмотров 46 тыс.
Windows Memory Forensics
56:52
Просмотров 18 тыс.
Getting started in digital forensics
1:02:02
Просмотров 70 тыс.
DFS101: 11.1 Mobile Device Investigations
21:50
Просмотров 12 тыс.
Сложная распаковка iPhone 15
1:01
Просмотров 14 тыс.