Mobile App Investigations — McAfee Institute Skip to content

Mobile App Investigations

3
$150.00



PROGRAM DETAILS:
  • Delivery Method: Online Self-Study
  • Duration: 15 Hours
  • Credits Awarded: 15 CPE
  • Credential Earned: Certificate of Completion

The Mobile App Investigation Program is designed to provide investigators with the training necessary to complete forensically sound, data acquisitions of digital evidence from social networking applications.

This incredible online instructor-led training program is destined to be the most exciting programs to hit the industry. There is nothing out there in the terms of mobile app intelligence and investigations training that match the content, real-world expertise, up-to-date tutorials and exercises offered in this incredible program.

You will learn all of the MOST POPULAR social media sites available as mobile applications, chat tools, OSINT and more that we will face over the next year. As well as the most SECRETIVE and closely guarded intelligence and investigative techniques we have to offer!

At the conclusion of this program, you will have a demonstrated through the successful completion of an online exam and a practical exercise that you have an in-depth knowledge of:

  • Social Media Investigation Methodologies
  • Social Media Intelligence Processes
  • Social Media Mobile Applications
  • Open Source Intelligence Methodologies
  • Legal Fundamentals Relating to Cyber Investigations
  • Introduction
  • Introduce yourself!
  • An Overview of Basic Social Media Investigations
  • Facebook Search Techniques
  • Locating People on Facebook
  • Exploring the Facebook Profile
  • Facebook Search Tool
  • Facebook Private Profile Information
  • An Exploration into Twitter
  • Twitter Search Techniques
  • Twitter Mobile App
  • An Exploration into YouTube
  • YouTube Search
  • Ethical Considerations
  • Advanced Social Media Introduction
  • Open Source Intelligence
  • Anatomy of Social Media
  • An Exploration into Domain Names
  • Username Workflow
  • How to Utilize Search Engines
  • Advanced Facebook Seach Techniques
  • Advanced Twitter Search Techniques
  • Advanced Instagram Search Techniques
  • Advanced YouTube Search Techniques
  • How to Use HootSuite and SproutSocial
  • Open Source Intelligence Explored
  • A World of Sock Puppets
  • Keep Yourself Protected
  • Criminals: An Inside Look in Dumb Criminals Posting Criminal Acts Online
  • Exploring TOR
  • Exploring the BitCoin
  • The Secrets Behind the TOR Browser
  • Digital Case File
  • An Exploration into the Deep Web
  • Open Source Summit Resources
  • Intro to Mobile Forensics
  • Mobile Forensics Acquisition
  • Mobile Forensics Examination & Analysis
  • Procedures and Principles
  • Mobile Phone Acquisition/Examination/Reporting (Reading Assignment)
  • Tinder Intelligence & Investigations
  • Skype Intelligence & Investigations
  • SnapChat Intelligence & Investigations
  • Kik Intelligence & Investigations
  • WeChat Intelligence & Investigations
  • Tango Intelligence & Investigations
  • Viber Intelligence & Investigations
  • QQ Intelligence & Investigations
  • LINE Intelligence & Investigations
  • Yik Yak Intelligence & Investigations
  • Legal Fundamentals (Reading Assignment)
  • Legal Fundamentals Discussion
  • Additional Resource: DOJ Prosecuting Computer Crimes Manual
  • Final Exam