• 708.689.0131
  • Contact us
  • Login
Infosec Logo
  • Infosec Logo
  • Products
  • Solutions
  • Resources
  • Company
  • Product overview
  • Infosec IQ logo Security awareness & culture
  • Infosec Skills logo On-demand training & cyber ranges
  • Infosec Skills Live Boot Camps logo On-demand training & cyber ranges
  • Infosec IQ overview
  • Security awareness training
  • Phishing simulator
  • Reporting & assessments
  • Integrations & automation
  • Global administration
  • Browse all training
  • Pricing & features
  • Demo
  • Infosec Skills overview
  • Role-guided training
  • Infosec Skills Teams
  • Cyber ranges & labs
  • Certifications & CPEs
  • Skill assessments
  • Browse all training
  • Pricing & features
  • Book a meeting
  • Live boot camps
  • Infosec Institute certifications
  • DoD 8570 certifications
  • Get team boot camp pricing
  • View boot camp schedule
  • Book a meeting
  • Pre-built training plans
  • Compliance, industry & role-based training
  • Custom education
  • Personalized learning
  • Languages
  • Gamified learning
  • 1000+ phishing templates
  • Simulation types
  • Phishing email reporter
  • Dashboard reports
  • Security culture survey
  • Assessments
  • Learner analytics
  • Learner management
  • Threat response orchestration
  • Integrations
  • 52 NICE Work Roles
  • SOC Analyst
  • Cloud Security Engineer
  • Security Manager
  • ICS Security Practitioner
  • Security Engineer
  • Penetration Tester
  • Digital Forensics Analyst
  • Information Risk Analyst
  • Security Architect
  • Secure Coder
  • Boot camp overview
  • CISSP Boot Camp
  • Security+ Boot Camp
  • Ethical Hacking Boot Camp
  • CCNA Dual Cert Boot Camp
  • CASP+ Boot Camp
  • CCSP Boot Camp
  • CISM Boot Camp
  • CySA+ Boot Camp
  • PMP Boot Camp
  • Browse all boot camps
Choose Your Own Adventure

Security awareness games by Infosec

Click to Play

On-demand training for every cybersecurity role

Download Catalog

Certification training from industry experts

Get Pricing
  • Solutions overview
  • By organization type
  • By need
  • For business teams
  • For government & contractor teams
  • For MSPs & resellers
  • Security awareness
  • Phishing simulation
  • Technical skill development
  • IT certification
  • Compliance & framework
  • CMMC certification

    2021 IT & Security Talent Pipeline Study

    Download Now
    • Cyber Work
    • Webcasts
    • Case studies
    • Reports & whitepapers
    • Blog
    • Community
    • Infosec Inspire
    • Free tools
    • Cyber Work Podcast
    • Cyber Work Applied
    • Infosec Insiders
    • TechExams
    • YouTube
    • LinkedIn
    • Facebook
    • Twitter
    • Phishing Risk Test
    • Security awareness ROI calculator
    • Security awareness training plans
    • Security awareness buyer’s guide

      Cyber Work Podcast

      New cybersecurity career conversations every week

      Listen Now
      • About us
      • Events & webcasts
      • Careers
      • Scholarships & awards
      • Infosec Gives
      • Infosec Gives Partner Program
      • About us
      • Leadership
      • Newsroom
      • Recognition
      • Industry alliances
      • Infosec Hall of Fame
      • Infosec Security Awareness Awards
      • Infosec Accelerate Scholarship Program

        We’re hiring!

        Join a team dedicated to making a difference.

        Get To Know Us

        Mobile Forensics Training Boot Camp

        Learn how to use mobile forensics to investigate cybercrime! Our Mobile Forensics Boot Camp builds your skills in a hands-on lab environment so you can apply what you learned the day you leave training.

        ★★★★☆
        4.2
        (443 ratings)
        View Pricing Book a Boot Camp
        mobile-forensics-boot-camp

        Earn your CMFE, guaranteed!

        • Two days of expert, live forensics training
        • Exam Pass Guarantee
        • Exam voucher
        • Unlimited practice exam attempts
        • 100% Satisfaction Guarantee
        • Free annual Infosec Skills subscription ($599 value!)
        • 1-year access to all boot camp video replays and materials
        • Onsite proctoring of exam
        • Pre-study learning path
        • Knowledge Transfer Guarantee

        Hands-on labs

        Our scenario-based, hands-on labs simulate a real cybercrime investigation. You’ll gain practical skills in locating and examining evidence on devices and forensic images, as well as analyzing and reporting findings. You’ll work with with various commercial and open-source forensic tools within our unique cloud-based learning environment.

        View full course schedule

        Training overview

        This highly technical, hands-on boot camp is designed to provide you with in-depth coverage of critical techniques and information about identifying, preserving, extracting, analyzing and reporting forensic evidence on mobile devices through the use of the most popular mobile forensic tools. You will learn about the challenges of mobile forensics, walk through the analysis and examination of mobile devices, and gain a deep understanding of differences in evidence locations and examination techniques in Android, iOS and Windows phones. Extracting cloud data and examining feature phones is also covered.

        This boot camp also prepares you to become a Certified Mobile Forensics Examiner (CMFE) and provides practical, hands-on labs that help you to hit the ground running the day your boot camp ends.

        What you’ll learn

        • Applying advanced computer forensics analysis concepts to mobile devices
        • File carving tools and techniques
        • The HFS+ file system
        • Browsing the devices with SSH
        • Reading SQLlite data stores
        • Jailbreaking
        • Breaking device encryption keys
        • Data protection for keychain items
        • Recovering keyboard caches
        • Recovering deleted photo library and camera roll images
        • Recovering deleted browser cache items and other personal data
        • Recovering hidden call history data
        • Recovering map tiles from maps application
        • Analyzing cached and deleted email messages
        • Analyzing recovered SMS messages with timestamp data
        • Analyzing deleted voicemails
        • Establishing trusted pairing relationships with one or more desktop computers
        • Writing forensic reports

        Certification details

        This boot camp prepares you to become a Certified Mobile Forensics Examiner. The CMFE certification validates your knowledge of five domains related to the mobile forensics evidence recovery and analysis process:

        • Mobile forensics process
        • Android forensics
        • iOS forensics
        • Windows phones
        • Feature phone forensics

        Who should attend?

        • Law enforcement professionals looking to expand into mobile crime investigations
        • Legal professionals
        • IT and information security professionals being tasked with mobile forensics and incident handling
        • Anyone with a desire to learn about mobile forensics and develop their skills

        Prerequisites

        Students must have no criminal record. Basic computer skills, including the ability or desire to work outside the Windows GUI interface, are necessary. A+ certification and/or similar training and experience is not required but recommended.

        This is a very in-depth training course and is not intended for individuals who have limited or no computer skills.

        Everything you need to earn your CMFE

        • Two days of expert, live forensics training
        • Exam Pass Guarantee
        • Exam voucher
        • Unlimited practice exam attempts
        • 100% Satisfaction Guarantee
        • Free annual Infosec Skills subscription ($599 value!)
        • 1-year access to all boot camp video replays and materials
        • Onsite proctoring of exam
        • Pre-study learning path
        • Knowledge Transfer Guarantee
        Everything you need to earn your CMFE
        View Pricing

        Exam Pass Guarantee

        We guarantee you’ll pass your exam on the first attempt. Learn more.

        Mobile forensics training schedule

        Infosec’s mobile forensics training is more than just a boot camp. We support you before, during and after your live training to ensure you’re fully prepared for your exam — and get certified on your first attempt.

        • Before your boot camp
          • Start learning now. You’ll get immediate access to all the content in Infosec Skills so you can prepare for your live boot camp, uncover your knowledge gaps and maximize your training experience.

        • During your boot camp
          • Day 1

            Mobile forensics introduction

            • Types of devices
            • GPS
            • Cell phones
            • Tablets
            • Vendor and carrier identification
            • Obtaining information from cellular provider
            • GSM vs. CDMA
            • Common tools and methodology

            Mobile forensics process

            • Mobile forensics challenges
              • OS variety
              • Differences in hardware and filesystems
              • Security features
              • Data volatility
              • Cloud storage
            • Types of evidence found on mobile devices
            • Collecting mobile devices at the scene
              • Locating devices
              • Preserving volatile data
              • Physical components and accessories (SIM cards, SD cards, chargers, etc.)
              • Older phones and devices
            • Comparison of mobile operating systems
              • Android
              • iOS
              • Windows phone
              • Blackberry OS
            • Data acquisition methods
              • Logical acquisition
              • Physical acquisition
              • Manual acquisition
            • Reporting findings

            Android forensics

            • Android platform
              • Hardware
              • SDK and debug bridge
              • File systems and data structures
            • Android security model
              • Secure kernel and permissions
              • Full disk encryption
              • App security
            • Bypassing Android security features
              • Bootloader/recovery mode
              • Rooting an Android device
              • Lock screen bypassing techniques
            • Android logical data acquisition and analysis
              • Extracting the /data directory
              • Device information
              • SMS/MMS, email, browsing and social networking data
              • App and cloud data
            • Android physical data acquisition
              • Hardware-based techniques
              • JTAG
              • Chip-off
              • Android data recovery techniques

            Day 2

            iOS forensics

            • Apple iOS platform
              • iOS devices and hardware
              • iOS versions, file system and architecture
            • iOS security
              • Passcode and Touch ID
              • Privilege separation
              • ASLR and data execution prevention
              • Encryption
            • Bypassing iOS security features
              • Operating modes of iOS devices
              • Custom RAMDisk
              • Jailbreaking
              • Bypassing passcode
              • Breaking iOS device encryption keys
              • Establishing trusted communication with desktop computer
            • iOS data acquisition and analysis
              • SQLite databases
              • Property lists
              • Other important files (cookies, keyboard cache, recordings, etc.)
            • iPhone/iCloud backups
              • Backup structure
              • Extracting and examining unencrypted backups
              • Encrypted backups (extracting and decrypting the keychain)
            • iOS data recovery techniques

            Windows phones

            • Windows Phone OS: partitions and filesystems
            • Windows Phone security features
              • Secure boot
              • Application security and data protection
            • Windows Phone logical acquisition and analysis
              • Sideloading
              • Extracting SMS, email and application data
            • Windows 10 mobile OS forensics

            Feature phones forensics

            • Acquiring and examining data from feature phones
        • After your boot camp
          • Your boot camp includes a 1-year subscription to Infosec Skills, so you can take additional time to prepare for your exam, get a head start on your next certification goal or start earning CPEs.

        Free mobile forensics training resources

        Getting started in digital forensics

        Keatron Evans, Infosec instructor and Managing Partner at KM Cyber Security discusses the difference between computer, mobile and network forensics, how a forensics certification can progress your career and digital forensics questions from live viewers.

        Listen Now

        Common Mobile Forensics Tools and Techniques

        There are many tools and techniques available in mobile forensics. However, the selection of tools and techniques during an investigation depends on the type of mobile device and its associated media.

        Learn More

        iOS Forensics

        Mobile forensics is a field of digital forensics that is focused on mobile devices which are growing very fast. Learn iOS forensics in detail.

        See Resources

        Find your boot camp

        Take the course online?
        Learn more about online
        866.471.0059
        • Today
        • Next week
        • Next month
        See additional dates

        Sign up

        Enroll in a boot camp

          See additional dates
          Infosec logo

          Products

          Infosec IQ Security awareness, culture & phishing simulator Infosec Skills Hands-on skill development & boot camps

          Resources

          Cyber Work Blog Infosec Inspire Events & webcasts

          Company

          Contact us About Infosec Careers Newsroom Partners
          • ©2022 Infosec Institute, Inc.
            • Trademarks
            • Privacy Policy

          Infosec, part of Cengage Group

          We use cookies to personalize your experience and optimize site functionality. Accept Cookie settings
          Privacy & Cookies Policy

          Infosec cookie notice

          We use cookies to help understand your needs, optimize website functionality and give you the best experience possible. Use this policy to understand how, when and where cookies are stored on your device. 

          Want to know more? Contact [email protected].
          Necessary
          Always Enabled
          This type of cookie helps keep our website functioning. They provide access to account-based features and other secure areas of our site, and do not store information about you that could be used for marketing. This category of cookies cannot be disabled.
          Analytics
          Google Analytics cookies help us understand how visitors use our site. All data collected from Google Analytics is anonymized (including your IP address) and stored by Google on U.S. servers.
          Marketing
          We use this type of cookie to optimize our marketing campaigns. Marketing cookies are delivered by our database when you visit our site, complete a form or open email from us. Information stored in this cookie includes personal information like your name and what pages you view on our site.
          Save & Accept