0

Your Cart is Empty

7512

We currently have 1 seats left for this cohort. Hurry!




Industry Recognized

McAfee-Institute-Partner-Banner

The Mobile App Investigation Program is designed to provide investigators with the training necessary to complete forensically sound, data acquisitions of digital evidence from social networking applications.

This incredible online instructor-led training program is destined to be the most exciting programs to hit the industry. There is nothing out there in the terms of mobile app intelligence and investigations training that match the content, real-world expertise, up-to-date tutorials and exercises offered in this incredible program.

You will learn all of the MOST POPULAR social media sites available as mobile applications, chat tools, OSINT and more that we will face over the next year. As well as the most SECRETIVEand closely guarded intelligence and investigative techniques we have to offer!

At the conclusion of this program, you will have a demonstrated through the successful completion of an online exam and a practical exercise that you have an in-depth knowledge of:

  • Social Media Investigation Methodologies
  • Social Media Intelligence Processes
  • Social Media Mobile Applications
  • Open Source Intelligence Methodologies
  • Legal Fundamentals Relating to Cyber Investigations

Course Benefits:

  • Access: 24/7/365 Online Unlimited Access
  • Credential Earned: Certificate of Completion
  • Availability: Desktop, Mobile, Tablet
  • CPE Credits: Included
  • Nationally Recognized Credential: NASBA, NICE, & More
  • Live Mentors: Available 9-9PM CST via Chat

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment Please be advises that you may only claim CPE credit for a course once after the certificate of completion is issued. The certificate of completion is valid for 2 years.

Curriculum

Welcome to Mobile App Investigations

  • Introduction
  • Introduce yourself!

Basic Social Media Investigations

  • An Overview of Basic Social Media Investigations
  • Facebook Search Techniques
  • Locating People on Facebook
  • Exploring the Facebook Profile
  • Facebook Search Tool
  • Facebook Private Profile Information
  • An Exploration into Twitter
  • Twitter Search Techniques
  • Twitter Mobile App
  • An Exploration into YouTube
  • YouTube Search
  • An Exploration into Google+
  • Google+ Search Techniques
  • Ethical Considerations

Advanced Social Media Investigations

  • Advanced Social Media Introduction
  • Open Source Intelligence
  • Anatomy of Social Media
  • An Exploration into Domain Names
  • Username Workflow
  • How to Utilize Search Engines
  • Advanced Facebook Search Techniques
  • Advanced Twitter Search Techniques
  • Advanced Instagram Search Techniques
  • Advanced YouTube Search Techniques
  • How to Use HootSuite and SproutSocial

Open Source Intelligence

  • Open Source Intelligence Explored
  • A World of Sock Puppets
  • Keep Yourself Protected
  • Criminals: An Inside Look at Dumb Criminals Posting Criminal Acts Online
  • Exploring TOR
  • Exploring the BitCoin
  • The Secrets Behind the TOR Browser
  • Digital Case File
  • An Exploration into the Deep Web

Open Source Intelligence Resources

  • Open Source Summit Resources

Cell Phone & Mobile Device Forensics

  • Intro to Mobile Forensics
  • Mobile Forensics Acquisition
  • Mobile Forensics Examination & Analysis
  • Procedures and Principles
  • Mobile Phone Acquisition/Examination/Reporting (Reading Assignment)

Mobile Apps Intelligence & Investigations

  • Tinder Intelligence & Investigations
  • Skype Intelligence & Investigations
  • SnapChat Intelligence & Investigations
  • Kik Intelligence & Investigations
  • WeChat Intelligence & Investigations
  • Tango Intelligence & Investigations
  • Viber Intelligence & Investigations
  • QQ Intelligence & Investigations
  • LINE Intelligence & Investigations
  • Yik Yak Intelligence & Investigations

Legal Fundamentals

  • Legal Fundamentals (Reading Assignment)
  • Legal Fundamentals Discussion
  • Additional Resource: DOJ Prosecuting Computer Crimes Manual

Final Exam

  • Final Exam


      Our students come from some of the MOST AMAZING organizations and agencies around the world and you can be apart of it!