This bundle includes six of our two-hour webinars, each dealing with a different aspect of digital forensics. This download will include the recordings of each webinar, as well as all associated materials. Download all six webinars and all materials for one discounted price.
Smartphone Application Analysis – Recorded 07/03/18
This webinar will cover the aspects of extracting data from databases on Smartphones. The technology of Smartphones has changed the way forensics is done, and the mount of data stored on the devices continues to grow. A large amount of the data is being stored in files such as DB, SQL and SQLITE. Everything from website bookmarks, to voicemails dates and times, to pictures being stored in BLOB data is able to be recovered from a thorough examination. This webinar will introduce the attendee to the process of extracting data from these files, and also reveal some of the best places to look for hidden evidence. The topics covered in this webinar will cover:
What are the databases:
– Different types, SQL, SQLITE, DB
– Database structure
– Tables, SQLite sequence, ROWID
Where are they located:
– The different locations to search for them.
What type of data can be found:
– Text content
– BLOB data
Various tools that can recover data, including deleted
– Free tools
– Pay tools included in forensic tools.
Messaging Application Investigations and Forensics – Recorded 01/28/19
The number of messaging applications continues to expand. And these applications are commonly being used to communicate across different platforms. In this webinar the attendee will be introduced to many different messaging applications and the various way evidence can be collected for each of them.
What applications are currently being used
– KIK, WhatsApp, TextMe, Text Plus, Text Free, Facebook messenger
– How do the applications work
What can be recovered forensically
– A hands on demonstration of what can be obtained from each
What can be obtained from the server
On-Scene Triage of Electronic Evidence – Recorded 09/14/18
Gone are the days when we can just arrive at a scene, pull the plug on a computer tower, and take it back to the office for forensic examination. Now we must be prepared to identify a myriad of items, and we must be aware of situations which may necessitate significantly more complex and time-consuming evaluation on-scene. Valuable data can be lost forever if not collected at the correct time, in the correct manner. This webinar is intended to make investigators and responding officers aware of the types of electronic evidence that they may encounter, appropriate methods for seizing this evidence, special situations officers may encounter, and effective and appropriate tools and techniques for on-scene triage of electronic evidence. Some of the topics we’ll discuss include:
Identification of Electronic Evidence
– Electronic evidence that doesn’t look like electronic evidence
– Mobile devices
– Supplemental devices
Seizure of Electronic Evidence
– Special considerations; can we just pull the plug?
– Mobile devices; to isolate, or not to isolate?
– Transportation/storage after seizure
On-Scene Triage of Electronic Evidence
– Wireless network identification
– Detecting encryption
– Capturing volatile memory data – RAM, router logs
– On-Scene imaging of electronic data
On-Scene Router Interrogation – Recorded 09/28/18
With the widespread availability of open wifi networks, it is increasingly likely that our bad guys may be committing their on-line crimes from locations other than their own homes. In these situations, the IP address of their activities will resolve to the location of the wifi network, and may even cast suspicion on an innocent party.
Additionally, when we are executing a search warrant on a scene, we need to make sure that we have accounted for every computer, mobile devices, network attached storage devices, and anything else that may be attached to the network. This makes it vitally important that we are able to explore the inner workings of wifi routers, and understand what information may be available, where it may be located, and understand it volatility.
– Networking basics, public and private IP addresses, and MAC addresses
– What functions do routers perform, and how might they be important to our investigations?
– How do we access the router? Are we changing data?
– What types of equipment and software do we need to perform a router interrogation?
– What kinds of information may a router hold, and how can we document that information?
iOS Backup Forensics – Recorded 03/05/19
Apple’s iOS runs on some of the most popular mobile devices on the planet, used by millions of people every day. There are a large number of forensic tools which can successfully extract helpful data from these devices to aid in our investigations. But what happens if the device is no longer available to us? What if the device has been destroyed or disabled in order to prevent our examination? What if the data on the device has changed, and the key piece we are looking for is no longer present?
All may not be lost in these situations, because iOS device backup files are often available to us, and they can be examined just like the device itself, using a variety of tools.
In this webinar, we will examine the process of creation of, the location and structure of, the data contained in, and the tools that will help us analyze iOS device backup files.
Some topics will include:
The creation and structure of iOS backup files
– How and when are they created?
– Where are they located?
– What do they contain?
– How will we access them?
The examination of iOS backup files
– Forensic tools
– Inexpensive alternatives
– Manual examination
Drone Investigations and Forensics – Recorded 11/16/18
Drones have become very common. They are being used for everything from filming sports events, to photographing real estate to even racing. In this webinar the attendee will be introduced to the many ways that law enforcement may encounter drones. We will cover topics ranging from any legal requirements, to checking your flight patterns with the FAA, to how Law Enforcement can use drones, to any digital evidence that can be obtained from an examination of the devices.
– What Laws Govern Drone Usage
– Registering Drones
– How can Law Enforcement use drones:
Aerial photographs and videos of crime scenes
– Reconnaissance missions
– Searching for missing person(s)
– Crowd surveillance
– Forensic examinations of drones:
The examination of the device
– Examining any inserted SD cards
– Examining any phones or tablets used to control the drones
Please Note: Following purchase, you will receive an email with a link to the materials for these webinars. This link will be valid for 5 days, and will allow you to download all the materials. These will include a high quality version recording of each webinar (along with a player for that video format), a lower quality version of each webinar that can be viewed on nearly any device, a PDF version of the instructor’s presentation and note taking pages, and any other materials supplied by the instructor during the webinars.
The download of these webinars also includes certificates of attendance for one viewer. Instructions on how to access the quizzes for these webinars and download certificates will be included in the webinar recording.