Practical Mobile Forensics

eLearning course leading to certification by CMIT.

Students have 12 months to work at their own pace, and can start at any time of year.

Certified
Leads to CMIT certification.

Self-paced course
Online self-paced course.

Flexible
Start any time and work at your own pace.

Learn anywhere
Learn anytime, anywhere.

Practical Mobile Forensics

€295

or 3 interest-free payments with Klarna Logo

Course Details

Mobile Forensic is a specialist course designed to equip professionals with practical skills in forensic data extraction, cloud retrieval, and reverse engineering across iOS, Android, and Windows devices. Learners will gain experience using industry-standard tools such as Cellebrite UFED, Magnet AXIOM, and Belkasoft Evidence Center to recover deleted data, bypass security mechanisms, and analyse critical artefacts.

The course covers logical and physical data acquisition, cloud and backup analysis, and third-party app forensics for platforms like WhatsApp and Facebook. Learners will also develop skills in malware analysis and reverse engineering of mobile applications, learning to identify and dissect malicious software through static and dynamic techniques.

With a focus on forensically sound processes, learners will practise documenting findings to meet legal and compliance requirements. By the end of this course, you will be prepared to conduct comprehensive mobile forensic investigations using advanced tools and methods aligned with professional standards.

Learners are provided with the following resources:

  • eLearning resources – exercises, quizzes, flashcards and a glossary
  • Video lessons
  • Hands on labs
Who should complete this SDLC course?
  • Digital Forensics Professionals: For those conducting forensic investigations, this course develops skills in data extraction, cloud retrieval, and analysis of artefacts across mobile platforms.
  • Law Enforcement and Legal Investigators: Supports professionals needing to recover deleted data, bypass security, and document evidence in a forensically sound manner for legal proceedings.
  • Cybersecurity Analysts and Incident Responders: Equips security teams to analyse mobile malware, perform reverse engineering, and investigate security breaches on mobile devices.
  • IT and Security Consultants: Helps consultants deliver specialist mobile forensic services, including logical and physical acquisition, app forensics, and cloud analysis for clients.
  • Professionals Preparing for Forensics Certifications: Suitable for those looking to demonstrate advanced mobile forensics capabilities, using industry-standard tools and meeting compliance requirements.
Entry Requirements / Prerequisites

How CMIT eLearning Works…

Play
Topics covered in this Practical Mobile Forensics course
Preface
  • Who this course is for
  • What this course covers
  • To get the most out of this course
Introduction to Mobile Forensics
  • The need for mobile forensics
  • Understanding mobile forensics
  • Challenges in mobile forensics
  • The mobile phone evidence extraction process
  • Practical mobile forensic approaches
  • Potential evidence stored on mobile phones
  • Examination and analysis
  • Rules of evidence
  • Good forensic practices
Understanding the Internals of iOS Devices
  • iPhone models and hardware
  • iPad models and hardware
  • The HFS Plus and APFS filesystems
  • The iPhone OS
Data Acquisition from iOS Devices
  • Operating modes of iOS devices
  • Password protection and potential bypasses
  • Logical acquisition
  • Filesystem acquisition
Data Acquisition from iOS Backups
  • Working with iTunes backups
  • Creating and analyzing backups with iTunes
  • Extracting unencrypted backups
  • Handling encrypted backup files
  • Working with iCloud backups
iOS Data Analysis and Recovery
  • Interpreting iOS timestamps
  • Working with SQLite databases
  • Key artifacts – important iOS database files
  • Property lists
  • Other important files
  • Recovering deleted SQLite records
iOS Forensic Tools
  • Working with Cellebrite UFED Physical Analyzer
  • Working with Magnet AXIOM
  • Working with Belkasoft Evidence Center
  • Working with Elcomsoft Phone Viewer
Understanding Android
  • The evolution of Android
  • The Android architecture
  • Android security
  • The Android file hierarchy
  • The Android filesystem
Android Forensic Setup and Pre-Data Extraction Techniques
  • Setting up a forensic environment for Android
  • Connecting an Android device to a workstation
  • Screen lock bypassing techniques
  • Gaining root access
Android Data Extraction Techniques
  • Understanding data extraction techniques
  • Manual data extraction
  • Logical data extraction
  • Physical data extraction
Android Data Analysis and Recovery
  • Analyzing and extracting data from Android image files using the Autopsy tool
  • Understanding techniques to recover deleted files from the SD card and the internal memory
Android App Analysis, Malware, and Reverse Engineering
  • Analyzing widely used Android apps to retrieve valuable data
  • Techniques to reverse engineer an Android application
  • Android malware
Windows Phone Forensics
  • Windows Phone OS
  • Windows 10 Mobile security model
  • Windows Phone filesystem
  • Data acquisition
  • Commercial forensic tool acquisition methods
  • Extracting data without the use of commercial tools
  • Key artifacts for examination
Parsing Third-Party Application Files
  • Introduction to third-party applications
  • iOS, Android, and Windows Phone application data storage
  • Forensic methods used to extract third-party application data

 

Assessment
  • Once you successfully pass the programme(s), you will be able to download a Certificate of Completion.

Request Prospectus

Complete the form below to request a prospectus.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
This field is hidden when viewing the form
Opt in

Student Reviews of this course

0.0
0.0 out of 5 stars (based on 0 reviews)
Excellent0%
Very good0%
Average0%
Poor0%
Terrible0%

There are no reviews yet. Be the first one to write one.

Request A Prospectus

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
This field is hidden when viewing the form
Opt in
College of Management and IT (CMIT)
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Click here to view our Privacy Policy