Looking for Global training? Go to https://firebrand.training/en or stay on the current site (United Arab Emirates)
The rapid growth of the mobile sector continues to create exciting new career opportunities for IT professionals. Businesses of all sizes need staff with mobile security knowledge – learn how to protect their mobile systems from external threats on this CAST 612 Advanced Mobile Hacking and Forensics course.
Defend against attacks through Mobile Device Security Hardening and apply forensic industry best practices on this 3 day course.
You’ll get the chance to put your skills to the test – 80% of this course focuses on hands on lab exercises.
You’ll also gain an understanding of the following mobile and forensics topics:
Firebrand Training has again won the EC-Council Accredited Training Centre of the Year Award, from a Training Partner network that has more than 700 training centres across 107 countries. This extends a record-breaking run of successive awards to nine years.
Jay Bavisi, President of EC-Council said: “The annual EC-Council Awards highlights the commitment and achievements of our global partners and trainers that have contributed to the information security community.”
Other accelerated training providers rely heavily on lecture and independent self-testing and study.
Effective technical instruction must be highly varied and interactive to keep attention levels high, promote camaraderie and teamwork between the students and instructor, and solidify knowledge through hands-on learning.
This information has been provided as a helpful tool for candidates considering training. Courses that include certification come with a certification guarantee. Pass first time or train again for free (just pay for accommodation and exams on your return). We do not make any guarantees about personal successes or benefits of obtaining certification. Benefits of certification determined through studies do not guarantee any particular personal successes.
This is your introduction to the fundamental principles and methodologies used for legal forensics investigations
Lab 1: Scenario Case Investigation
Lab 2: Evidence Analysis
After completing this module, you'll be familiar with:
This module will focus on the hardware design specifications of the popular mobile devices
Lab: Under the hood of an iPhone
After completing this module, you'll be familiar with:
Study how mobiles boot, and use architectural design components. You'll also learn how data is stored and accessed for the IOS system
Lab: Jail-breaking and Rooting
After completing this module, you'll be familiar with:
This module explains how user data is stored and how to deal with deleted user evidence. It also describes the array of techniques that offer the greatest success for evidence acquisition
Lab 1: Binary Reality
Lab 2: Accessing Evidence
After completing this module, you'll be familiar with:
This module explains the genre and advanced Mobile Attacks
Lab 1: Hacking Tools and Analysis
Lab 2: Building our Environment
After completing this module, you'll be familiar with:
This module explains how to analyze evidence and produce detailed evidence reports. It also describes how technical savvy people can obscure evidence to negate or destroy the evidence
Lab 1: Popular Software for Analysis
After completing this module, you'll be familiar with:
This module explains the Penetration Testing training Life Cycle. It also describes the tools and techniques we can use for exploitation Vectors
Lab 1: Pen Test 101
Lab 2: Pen Test Model - BlueTooth Hacking
Note: This module is designed to be 100% hands-on covering the penetration testing methodology by utilizing BackTrack v5r1
This module explains Forensics Hardware Options. It also describes how we can build our portable Forensics field kits
Lab 1: Tag and Bag
Lab 2: Building our Forensic Station and Toolkit
After completing this module, you'll be familiar with:
This module explains how to wrap-up the case by compiling the report and focuses on presenting the technical results in Laymen terms
Lab 1: Creating the Report
After completing this module, you'll be familiar with:
You'll sit the following exam at the Firebrand Training Centre, covered by your certification guarantee:
Firebrand Training offers top-quality technical education and certification training in an all-inclusive course package specifically designed for the needs and ease of our students. We attend to every detail so our students can focus solely on their studies and certification goals.
Our instructors teach to accommodate every student's learning needs through individualised instruction, hands-on labs, lab partner and group exercises, independent study, self-testing, and question/answer drills.
Firebrand Training has dedicated, well-equipped educational facilities where you will attend instruction and labs and have access to comfortable study and lounging rooms. Our students consistently say our facilities are second-to-none.
Should a student complete a Firebrand Training Program without having successfully passed all vendor examinations, the student may re-attend that program for a period of one year. Students will only be responsible for accommodations and vendor exam fees.
You'll be expected to possess:
Before attending this course, it’s also recommended that you have:
Unsure whether you meet the prerequisites? Don’t worry. Your training consultant will discuss your background with you to understand if this course is right for you.
Here's the Firebrand Training review section. Since 2001 we've trained exactly 102,584 students and asked them all to review our Accelerated Learning. Currently, 96.68% have said Firebrand exceeded their expectations.
Read reviews from recent accelerated courses below or visit Firebrand Stories for written and video interviews from our alumni.
"Firebrand has been an excellent experience that has bolstered my knowledge of security greatly. The course volume and length of the days are quite the undertaking but the teaching style makes it work with an excellent pay off from sticking through it."
D.B.. (2/4/2021 (Friday) to 6/4/2021 (Tuesday))
"The material has been presented professionaly. Breaks has been given quite regularly. The instructor has been very helpful"
Nikolina Ilcheva, NIKOLINA ILCHEVA. (2/4/2021 (Friday) to 6/4/2021 (Tuesday))
"Wow! What an amazing course. I have gained a massive amount of knowledge over the last 5 days. And the tutor made it more interesting than I even imagined :- I would recommend this training to anyone who wants to get immersed in the world of Ethical Hacking.
Thank you"
Daniel Cieslar. (1/2/2021 (Monday) to 5/2/2021 (Friday))
"Experience from the outset was excellent. I was advised on the best course of action which really helped me decide the most appropriate course. The instructor delivered the course SUPERBLY. Wow! What a body of knowledge he possesses. First class experience and i can highly recommend this course!!"
Alan Gardner, Darkskope Corporation. (8/2/2021 (Monday) to 10/2/2021 (Wednesday))
"At first hesitant to try online training as I prefer the face to face and interaction. Found it was really good and managed very well."
Shane Lewis, Semafone Limited. (8/2/2021 (Monday) to 10/2/2021 (Wednesday))
Start |
Finish |
Status |
Location |
Book now |
---|---|---|---|---|
22/2/2021 (Monday) |
24/2/2021 (Wednesday) |
Finished - Leave feedback |
- |
|
28/6/2021 (Monday) |
30/6/2021 (Wednesday) |
Wait list |
Nationwide |
|
9/8/2021 (Monday) |
11/8/2021 (Wednesday) |
Limited availability |
Nationwide |
|
20/9/2021 (Monday) |
22/9/2021 (Wednesday) |
Open |
Nationwide |
|
1/11/2021 (Monday) |
3/11/2021 (Wednesday) |
Open |
Nationwide |
|
13/12/2021 (Monday) |
15/12/2021 (Wednesday) |
Open |
Nationwide |
|