BlackBag Essential Forensic Techniques II
In the five-day EFT II training, we, among others, will go into the more complex concepts like recovery points found in an iOS, Windows and/or Mac OS X investigation. Operating systems leave behind complex traces in both the assigned space and the unassigned free space on a data carrier. The course is left by a teacher who provides extensive explanation about the subject matter, but there will also be many practical exercises to be carried out by the participants themselves.
For whom is this training intended?
This Mac Forensic analysis training for advanced investigators is meant for digital investigators with proper knowledge of Computer Forensics and extensive knowledge of Mac forensic investigations acquired in, for example, the BlackBag EFT I training.
What will you learn during the training?
At the end of this training, the participants are able to identify the different Mac copy files and additionally, copies made with other tools or operating systems. The location in the file system, how to gather information in a forensically correct way and how to crack passwords will also be addressed.