Boot Camp

Computer and Mobile Forensics Training Boot Camp

Learn how to investigate cybercrime! This popular boot camp goes in-depth into the tools, techniques and processes used by forensics examiners to find and extract evidence from computers and mobile devices.

4.2 (443 ratings)

Get certified, guaranteed

Everything you need to earn your CCFECMFE

  • 1-Year access to all boot camp video replays and materials
  • 100% Satisfaction Guarantee
  • Exam Pass Guarantee
  • Exam voucher
  • Free annual Infosec Skills subscription ($299 value!)
  • Hands-on cyber ranges and labs
  • Knowledge Transfer Guarantee
  • Onsite proctoring of exam
  • Pre-study learning path
  • Unlimited practice exam attempts
Wistia video thumbnail

What you'll learn

Training overview

Infosec’s Computer and Mobile Forensics Boot Camp teaches you how to identify, preserve, extract, analyze and report forensic evidence on computers and mobile devices. You will learn about the challenges of computer and mobile forensics, walk through the process of analysis and examination of operating systems and mobile devices, and gain a deep understanding of differences in evidence locations and examination techniques on Windows and Linux computers and Android, iOS and Windows phones.

More than 30 hands-on labs simulating a real cybercrime investigation provide you with practical experience using commercial and open-source forensic tools. The boot camp also prepares you to earn two popular certifications: the Certified Computer Forensics Examiner (CCFE) and the Certified Mobile Forensics Examiner (CMFE).

Before your boot camp

Prerequisites

Students must have no criminal record. Basic computer skills, including the ability or desire to work outside the Windows GUI interface, are necessary. A+ certification and/or similar training and experience is not required, but recommended.

This is a very in-depth training course and is not intended for individuals who have limited or no computer skills.

    Syllabus

  • Day 1
    • Course introduction

      • Computer forensics and investigation as a profession
      • Define computer forensics
      • Describe how to prepare for computer investigations and explain the difference between law enforcement agency and corporate investigations
      • Explain the importance of maintaining professional conduct

      Digital evidence — legal issues

      • Identifying digital evidence
      • Evidence admissibility
      • Federal rules of evidence
      • Daubert standard
      • Discovery
      • Warrants
      • What is seizure?
      • Consent issues
      • Expert witness
      • Roles and responsibilities
      • Ethics
      • (ISC)²
      • AAFS
      • ISO

      Investigations

      • Investigative process
      • Chain of custody
      • Incident response
      • E-discovery
      • Criminal vs. civil vs. administrative investigations
      • Intellectual property
      • Reporting
      • Quality control
      • Evidence management
      • Current computer forensics tools and hardware
  • Day 2
    • Forensic science fundamentals

      • Principles and methods
      • Forensic analysis process

      Hardware

      • Storage media
      • Operating system

      File systems

      • File systems
      • Erased vs. deleted
      • Live forensics
  • Day 3
    • File and operating system forensics

      • Keyword searching
      • Metadata
      • Timeline analysis
      • Hash analysis
      • File signatures
      • Volume Shadow Copies
      • Time zone issues
      • Link files
      • Print spool
      • Deleted files
      • File slack
      • Damaged media
      • Registry forensics
      • Multimedia files
      • Compound files

      Web and application forensics

      • Common web attack vectors
      • Browser artifacts
      • Email investigations
      • Messaging forensics
      • Database forensics
      • Software forensics
      • Malware analysis
  • Day 4
    • Network forensics

      • TCP/IP
      • Types of attacks
      • Wired vs. wireless
      • Network devices forensics

      Packet analysis

      • OS utilities
      • Network monitoring tools

      Anti-forensics

      • Hiding
      • Steganography
      • Packing
      • Hidden devices (NAS)
      • Tunneling/Onion routing
      • Destruction
      • Spoofing
      • Log tampering
      • Live operating systems
  • Day 5
    • New & emerging technology

      • Legal issues (privacy, obtaining warrants)
      • Social networks forensics
      • Types of social networks
      • Types of evidence
      • Collecting data
      • Virtualization
      • Virtualization forensics
      • Use of virtualization in forensics
      • Cloud forensics
      • Types of cloud services
      • Challenges of cloud forensics
      • Big data
      • Control systems and IOT

      Mobile forensics introduction

      • Types of devices
      • GPS
      • Cell phones
      • Tablets
      • Vendor and carrier identification
      • Obtaining information from cellular provider
      • GSM vs. CDMA
      • Common tools and methodology
  • Day 6
    • Mobile forensics process

      • Mobile forensics challenges
      • Types of evidence found on mobile devices
      • Collecting mobile devices at the scene
      • Comparison of mobile operating systems
      • Data acquisition methods
      • Reporting findings

      Android forensics

      • Android platform
      • Android security model
      • Bypassing Android security features
      • Android logical data acquisition and analysis
      • Android physical data acquisition
  • Day 7
    • iOS forensics

      • Apple iOS platform
      • iOS security
      • Bypassing iOS security features
      • iOS data acquisition and analysis
      • iPhone/iCloud backups
      • iOS data recovery techniques

      Windows phones

      • Windows Phone OS: partitions and filesystems
      • Windows Phone security features
      • Windows Phone logical acquisition and analysis
      • Windows 10 mobile OS forensics

      Feature phones forensics

      • Acquiring and examining data from feature phones

Syllabus

Training schedule

Guaranteed results

Our boot camp guarantees

Exam Pass Guarantee

If you don’t pass your exam on the first attempt, get a second attempt for free. Includes the ability to re-sit the course for free for up to one year (does not apply to CMMC-AB boot camps).

100% Satisfaction Guarantee

If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.

Knowledge Transfer Guarantee

If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.

Unlock team training discounts

If you’re like many of our clients, employee certification is more than a goal — it’s a business requirement. Connect with our team to learn more about our training discounts.

Enroll in a boot camp

  • November 14, 2022 - November 20, 2022

    Online only

    Exam Pass Guarantee
  • January 23, 2023 - February 5, 2023

    Online only

    Exam Pass Guarantee
  • February 27, 2023 - March 5, 2023

    Online only

    Exam Pass Guarantee
  • March 13, 2023 - March 19, 2023

    Online only

    Exam Pass Guarantee
  • April 3, 2023 - April 9, 2023

    Online only

    Exam Pass Guarantee
  • June 12, 2023 - June 18, 2023

    Online only

    Exam Pass Guarantee
  • July 17, 2023 - July 23, 2023

    Online only

    Exam Pass Guarantee
  • September 11, 2023 - September 17, 2023

    Online only

    Exam Pass Guarantee