EC-Council - CAST 612 Advanced Hacking & Forensics



Only 3 Days



Classroom / Online / Hybrid

Next date

Next date:

28/6/2021 (Monday)


The rapid growth of the mobile sector continues to create exciting new career opportunities for IT professionals. Businesses of all sizes need staff with mobile security knowledge – learn how to protect their mobile systems from external threats on this CAST 612 Advanced Mobile Hacking and Forensics course.

Defend against attacks through Mobile Device Security Hardening and apply forensic industry best practices on this 3 day course.

You’ll get the chance to put your skills to the test – 80% of this course focuses on hands on lab exercises.

You’ll also gain an understanding of the following mobile and forensics topics:

  • Tehnical aspects of Mobile Forensics
  • Forensics methodology
  • Mobile OSX Architecture
  • Evidence acquisition
  • Passcode bypassing
  • IOS, Android & Blackberry platform weaknesses

9x Accredited Training Centre of the Year

Accredited Training Centre of the Year

Firebrand Training has again won the EC-Council Accredited Training Centre of the Year Award, from a Training Partner network that has more than 700 training centres across 107 countries. This extends a record-breaking run of successive awards to nine years.

Jay Bavisi, President of EC-Council said: “The annual EC-Council Awards highlights the commitment and achievements of our global partners and trainers that have contributed to the information security community.”

Seven reasons why you should sit your CAST 612 course with Firebrand Training

  1. You’ll be CAST 612 certified in just 3 days. With us, you’ll be CAST 612 trained in record time
  2. Our CAST 612 course is all-inclusive. A one-off fee covers all course materials, accommodation and meals. No hidden extras
  3. Pass CAST 612 first time or train again for free. This is our guarantee. We’re confident you’ll pass your course first time. But if not, come back within a year and only pay for accommodation, exams and incidental costs
  4. You’ll learn more CAST 612. A day with a traditional training provider generally runs from 9am – 5pm, with a nice long break for lunch. With Firebrand Training you’ll get at least 12 hours/day quality learning time, with your instructor
  5. You’ll learn CAST 612 faster. Chances are, you’ll have a different learning style to those around you. We combine visual, auditory and tactile styles to deliver the material in a way that ensures you will learn faster and more easily
  6. You’ll be studying CAST 612 with the best. We’ve been named in Training Industry’s “Top 20 IT Training Companies of the Year” every year since 2010. As well as winning many more awards, we’ve trained and certified 102,584 professionals, and we’re partners with all of the big names in the business
  7. You'll do more than study CAST 612 courseware. We use labs, case studies and practice tests to make sure you can apply your new knowledge to the work environment. Our instructors use demonstrations and real-world experience to keep the day interesting and engaging


Other accelerated training providers rely heavily on lecture and independent self-testing and study.

Effective technical instruction must be highly varied and interactive to keep attention levels high, promote camaraderie and teamwork between the students and instructor, and solidify knowledge through hands-on learning.

Firebrand Training provides instruction to meet every learning need:

  • Intensive group instruction
  • One-on-one instruction attention
  • Hands-on labs
  • Lab partner and group exercises
  • Question and answer drills
  • Independent study

This information has been provided as a helpful tool for candidates considering training. Courses that include certification come with a certification guarantee. Pass first time or train again for free (just pay for accommodation and exams on your return). We do not make any guarantees about personal successes or benefits of obtaining certification. Benefits of certification determined through studies do not guarantee any particular personal successes.


1. Mobile Hacking and Digital Forensic Challenges

This is your introduction to the fundamental principles and methodologies used for legal forensics investigations

  • History of Digital Forensics
  • Global Legal System - Challenges
  • Technical Aspects of Mobile Forensics
  • Trace, Seize and investigate – Cyber Crime Case Scenarios
  • Criminal / Civil Incidents
  • Cyber Fraud
  • Insider / Unknown Threats
  • Recommended reading

Lab 1: Scenario Case Investigation

Lab 2: Evidence Analysis

After completing this module, you'll be familiar with:

  • Creating a new case using FTK and import case evidence
  • Standard Evidence storage acquisition of a hard disk
  • Using FTK and Caine Live CD for case evidence analysis and evidence priority
  • Exploring the difference of Physical vs. Logical Evidence Acquisition

2. Mobile Hardware Design for iPhone, BlackBerry, Android and other devices

This module will focus on the hardware design specifications of the popular mobile devices

  • Forensics Methodology
  • Why we need in-depth knowledge of the designs
  • iDevice teardown schematics (Ipad, Iphone and Ipad)
  • Android teardown schematics (HTC and Samsung)
  • Blackberry Bold teardown
  • Standard designs of other mobile devices
  • Mobile Hardware Tool Kits

Lab: Under the hood of an iPhone

After completing this module, you'll be familiar with:

  • Diving deep into the hardware aspects of mobile devices
  • Appreciating the different methods, techniques and tools involved

3. Mobile Software design and the common boot process for Smart Devices

Study how mobiles boot, and use architectural design components. You'll also learn how data is stored and accessed for the IOS system

  • Fundamental Open Source Software
  • Why specialize?
  • Mobile OSX Architecture
  • Core Definitions
  • UI Framework IOS
  • OSX Boot Overview
  • iPhone DFU – Recovery Modes
  • Android Boot Process
  • IOS Kernel Design
  • Jail-breaking / Rooting, REALLY? why, what and how

Lab: Jail-breaking and Rooting

After completing this module, you'll be familiar with:

  • Understanding Apple and Android Architecture
  • Appreciating UI Frameworks and IOS Kernel Design
  • Jail-breaking and rooting IOS and Android

4. Mobile Device Storage and Evidence Acquisition Techniques

This module explains how user data is stored and how to deal with deleted user evidence. It also describes the array of techniques that offer the greatest success for evidence acquisition

  • Analysis Open Source Tool and SDK Software kits for Apple and Android
  • Evidence Acquisition
  • Smart Phone Characteristics
  • Slack Space – Hidden Data
  • MBR – EFI Basic Storage Designs
  • Partitions and device specifics
  • Passcode Protection – Encrypted Backups

Lab 1: Binary Reality

Lab 2: Accessing Evidence

After completing this module, you'll be familiar with:

  • Using manual open-source evidence acquisition methods
  • Bypassing passcode protection
  • The importance of HEX editors
  • Primary unix commands and techniques used

5. Advanced Mobile Attack Analysis

This module explains the genre and advanced Mobile Attacks

  • How Mobile Devices get Hacked
  • Debuggers and Decompiles
  • Reverse Engineering
  • IPA and APK Packages
  • iPhone App Store Specifics

Lab 1: Hacking Tools and Analysis

Lab 2: Building our Environment

After completing this module, you'll be familiar with:

  • Analyzing Real Threats
  • Using open source tools and techniques

6. Mobile Device Hacking Techniques and Tools

This module explains how to analyze evidence and produce detailed evidence reports. It also describes how technical savvy people can obscure evidence to negate or destroy the evidence

  • Hacking can kill you
  • Threat Predictions 2011 / 2012
  • Mobile Hacking Techniques
  • IOS Platform Weaknesses
  • Android Platform Weaknesses
  • Blackberry Platform Weaknesses

Lab 1: Popular Software for Analysis

After completing this module, you'll be familiar with:

  • Understanding Hacking Techniques and Tools.
  • Launching Spear Phishing Attacks.
  • Planting Hidden Payloads

7. Penetration Testing and Exploitation Vectors

This module explains the Penetration Testing training Life Cycle. It also describes the tools and techniques we can use for exploitation Vectors

  • Information Gathering
  • Manual Exploitation
  • Exploit Frameworks
  • Cracking Passwords

Lab 1: Pen Test 101

Lab 2: Pen Test Model - BlueTooth Hacking

Note: This module is designed to be 100% hands-on covering the penetration testing methodology by utilizing BackTrack v5r1

8. Mobile Forensic Hardware and Software Field Kits

This module explains Forensics Hardware Options. It also describes how we can build our portable Forensics field kits

  • DIY Toolkit Options and costs
  • Commercial Comparisons
  • Pros and cons of open source
  • Field Kit Review and best practices

Lab 1: Tag and Bag

Lab 2: Building our Forensic Station and Toolkit

After completing this module, you'll be familiar with:

  • Using open source tools and techniques
  • Using commercial packages
  • Critical aspects related to Chain of Custody, documentation and protection of evidence techniques

9. Forensic Software, Evidence Analysis and Reporting

This module explains how to wrap-up the case by compiling the report and focuses on presenting the technical results in Laymen terms

  • Disclaimer/ Legal
  • Introduction to software packages
  • Forensics Reports
  • Best Evidence Rule
  • Evidence Report Documentation

Lab 1: Creating the Report

After completing this module, you'll be familiar with:

  • Categorizing Evidence
  • Evidence Tampering
  • The various software used

Exam Track

You'll sit the following exam at the Firebrand Training Centre, covered by your certification guarantee:

  • CAST 612 - Certified in Advanced Mobile Hacking & Forensics

What's Included

Official EC-Council Courseware

  • CAST 612 - Advanced Mobile Hacking & Forensics

Firebrand Training offers top-quality technical education and certification training in an all-inclusive course package specifically designed for the needs and ease of our students. We attend to every detail so our students can focus solely on their studies and certification goals.

Our Certification Programs includes

  • Intensive Hands-on Training Utilising our (Lecture | Lab | Review)TM Delivery
  • Comprehensive Study Materials, Program Courseware and Self-Testing Software including MeasureUp *
  • Fully instructor-led program with 24 hour lab access
  • Examination vouchers **
  • Near site testing, Transportation to/from Testing Center are provided ***
  • Accommodation, all meals, unlimited beverages, snacks and tea / coffee****
  • Examination Passing Policy

Please note

  • * Not on all courses
  • ** Examination vouchers are not included for the following courses: PMP, CAPM and CISSP CBK Review
  • *** Not included in our PMP, CAPM, CISA, CISM, CGEIT, CRISC, (ISC)2 or ITIL Managers and Revision Certifications
  • **** Accommodation not included on the CISSP CBK Review Seminar

Our instructors teach to accommodate every student's learning needs through individualised instruction, hands-on labs, lab partner and group exercises, independent study, self-testing, and question/answer drills.

Firebrand Training has dedicated, well-equipped educational facilities where you will attend instruction and labs and have access to comfortable study and lounging rooms. Our students consistently say our facilities are second-to-none.

Examination Passing Policy

Should a student complete a Firebrand Training Program without having successfully passed all vendor examinations, the student may re-attend that program for a period of one year.  Students will only be responsible for accommodations and vendor exam fees.


You'll be expected to possess:

  • An understanding of Fundamental principles and process for digital forensics
  • Knowledge includes evidence acquisitions, examination analysis and final reporting
  • A minimum of 6 months Digital Forensics experience is recommended

Before attending this course, it’s also recommended that you have:

Unsure whether you meet the prerequisites? Don’t worry. Your training consultant will discuss your background with you to understand if this course is right for you.


Here's the Firebrand Training review section. Since 2001 we've trained exactly 102,584 students and asked them all to review our Accelerated Learning. Currently, 96.68% have said Firebrand exceeded their expectations.

Read reviews from recent accelerated courses below or visit Firebrand Stories for written and video interviews from our alumni.

"Firebrand has been an excellent experience that has bolstered my knowledge of security greatly. The course volume and length of the days are quite the undertaking but the teaching style makes it work with an excellent pay off from sticking through it."
D.B.. (2/4/2021 (Friday) to 6/4/2021 (Tuesday))

"The material has been presented professionaly. Breaks has been given quite regularly. The instructor has been very helpful"
Nikolina Ilcheva, NIKOLINA ILCHEVA. (2/4/2021 (Friday) to 6/4/2021 (Tuesday))

"Wow! What an amazing course. I have gained a massive amount of knowledge over the last 5 days. And the tutor made it more interesting than I even imagined :- I would recommend this training to anyone who wants to get immersed in the world of Ethical Hacking. Thank you"
Daniel Cieslar. (1/2/2021 (Monday) to 5/2/2021 (Friday))

"Experience from the outset was excellent. I was advised on the best course of action which really helped me decide the most appropriate course. The instructor delivered the course SUPERBLY. Wow! What a body of knowledge he possesses. First class experience and i can highly recommend this course!!"
Alan Gardner, Darkskope Corporation. (8/2/2021 (Monday) to 10/2/2021 (Wednesday))

"At first hesitant to try online training as I prefer the face to face and interaction. Found it was really good and managed very well."
Shane Lewis, Semafone Limited. (8/2/2021 (Monday) to 10/2/2021 (Wednesday))

Course Dates





Book now

22/2/2021 (Monday)

24/2/2021 (Wednesday)

Finished - Leave feedback



28/6/2021 (Monday)

30/6/2021 (Wednesday)

Wait list



9/8/2021 (Monday)

11/8/2021 (Wednesday)

Limited availability



20/9/2021 (Monday)

22/9/2021 (Wednesday)




1/11/2021 (Monday)

3/11/2021 (Wednesday)




13/12/2021 (Monday)

15/12/2021 (Wednesday)




Latest Reviews from our students