Academics

Our curriculum provides a comprehensive solution to Computer Network Operations (CNO) training in the fields of Computer Penetration Testing, Red Teaming, Vulnerability Analysis, and Exploitation.

Mobile Device Forensics

ACE Evaluated & Recommended

American Council on Education - ACE CREDIT. College Credit Recommendation Service

The American Council on Education's College Credit Recommendation Service (ACE CREDIT) has evaluated 8 of 19 TCS Art of Exploitation courses. For more information, visit the ACE CREDIT website at www.acenet.edu/credit.

Courses - Mobile Device Forensics

As users embrace the mobile technologies that continue to emerge, retrieving information from these devices by those with the need and authority becomes necessary. The Art of Exploitation: Mobile Device Forensics Edition introduces the user to the various mobile technologies, infrastructures, acquisition concepts and techniques, and operating systems. Students of this course will be introduced to a method of data retrieval that can be followed against most devices available today. Students also will learn where and how information is stored.

Prerequisites

  • Understanding of Network Communications Fundamentals
  • Understanding of Windows command line familiarity
  • Understanding of UNIX command line familiarity

Topics

  1. Mobile Technology and Infrastructure
  2. Understanding Mobile Operating Systems
  3. Application Lifestyle
  4. Data Storage Location and Methodology
  5. Locating and Recovering User Data
Mobile Device Forensics Datasheet

Course Pricing

LengthCommercialGovernment
4 Days$3,000.00$2,063.00

Copyright © 2014, AoE™. All Rights Reserved.
Powered by TCS Cyber Intelligence, a division of TeleCommunication Systems Inc. (TCS) | NASDAQ: TSYS