In this five-day training, we, among others, will go into the more complex concepts like recovery points found in an iOS, Windows and/or Mac OS X investigation. Operating systems leave behind complex traces in both the assigned space and the unassigned free space on a data carrier. The course is left by a teacher who provides extensive explanation about the subject matter, but there will also be many practical exercises to be carried out by the participants themselves.
For whom is this training intended? This Mac Forensic analysis training for advanced investigators is meant for digital investigators with proper knowledge of Computer Forensics and extensive knowledge of Mac forensic investigations acquired in, for example, the Cellebrite Apple Forensic Investigations Training.
What will you learn during the training? At the end of this training, the participants are able to identify the different Mac copy files and additionally, copies made with other tools or operating systems. The location in the file system, how to gather information in a forensically correct way and how to crack passwords will also be addressed.
We find it very important that you are aware of which cookies our website uses and for which purposes. We use Functional Cookies to make our website function properly. In addition, we use Analytics Cookies to analyze the use of our website. We also ask your permission for the placement of cookies from third parties (social media, advertising and analytics partners) with whom we share information. By clicking 'Accept', you accept the placement of the above mentioned cookies. If you click on 'Settings', you will be taken to a page where you can specify which cookies may and may not be placed. Click here for our Privacy Statement.