Mobile Device Forensics is an ever expanding field with new devices and technologies emerging weekly. Syntricate Mobile Forensic curriculum provides the examiner the knowledge, skills and abilities necessary to conduct effective and thorough forensic examinations on the latest trending devices.
With all of the challenges that face the Mobile Device Examiner, Syntricate Mobile Device Forensic Training offers a wide array of training topics from the introductory level where the basics of cellular technology and devices are discussed, call detail records, through the advanced where examiners are digging for artifacts in hex and extracting data using JTAG and Chip-Off techniques. We also understand that not all the data exists on the device, so we offer comprehensive courses in requesting data from carriers, cloud storage, and transactional records maintained by various service providers.
AccessData Group provides both stand-alone and enterprise-class solutions that can synergistically work together to enable both criminal and civil E-Discovery of any kind, including digital investigations, computer forensics, legal review, compliance, auditing and information assurance.
High Tech Crime Institute is a global leader in Mobile Cell Phone Forensics, Mobile Forensics Software and Mobile Forensics Training and Education. HTCI has been uniquely qualified to provide expert Forensic Instruction, proactive Security Management and Computer Forensics platforms and classes to the military, police, emergency services and the general public since 2002.
Python Forensics, Inc. is a non-profit organization focused on the collaborative development of open source investigative technologies using the Python programming language. We invite you to join us! Rapid development of new cybercrime investigation tools is an essential ingredient in virtually every case and environment. Whether you are performing post-mortem investigation, executing live triage, extracting evidence from mobile devices or cloud services, or you are collecting and processing evidence from a network, Python forensic implementations can fill in the gaps.