EC-Council CAST 612 Advanced Hacking & Forensics - Just 3 Days

Why

What do our customers say?

"Intensive and filled with info that will keep one busy for the coming weeks."
Anon. - EC-Council Certified Ethical Hacker (CEH) (5 days), 4/5/2015 to 8/5/2015

Four reasons why you should sit your CAST 612 course with Firebrand Training

Find Out How We Help You To Learn New Skills Quickly

  1. You'll be CAST 612 trained and certified faster. Learn more on this 3-day accelerated course. You'll get at least 12 hours a day of quality learning time in a distraction-free environment
  2. Your CAST 612 course is all-inclusive. One simple price covers all course materials, exams, accommodation and meals – so you can focus on learning
  3. Pass CAST 612 first time or train again for free. Your expert instructor will deliver our unique accelerated learning methods, allowing you to learn faster and be in the best possible position to pass first time. In the unlikely event that you don't, it's covered by your Certification Guarantee
  4. Study CAST 612 with an award-winning training provider. We've won the Learning and Performance Institute's "Training Company of the Year" three times. Firebrand is your fastest way to learn, with 68.075 students saving more than one million hours since 2001

Think you are ready for the course? Take a FREE practice test to assess your knowledge!

What

The rapid growth of the mobile sector continues to create exciting new career opportunities for IT professionals. Businesses of all sizes need staff with mobile security knowledge – learn how to protect their mobile systems from external threats on this CAST 612 Advanced Mobile Hacking and Forensics course.

Defend against attacks through Mobile Device Security Hardening and apply forensic industry best practices on this 3 day course.

You’ll get the chance to put your skills to the test – 80% of this course focuses on hands on lab exercises.

You’ll also gain an understanding of the following mobile and forensics topics:

  • Tehnical aspects of Mobile Forensics
  • Forensics methodology
  • Mobile OSX Architecture
  • Evidence acquisition
  • Passcode bypassing
  • IOS, Android & Blackberry platform weaknesses

9x Accredited Training Centre of the Year

Accredited Training Centre of the Year

Firebrand Training has again won the EC-Council Accredited Training Centre of the Year Award, from a Training Partner network that has more than 700 training centres across 107 countries. This extends a record-breaking run of successive awards to nine years.

Jay Bavisi, President of EC-Council said: “The annual EC-Council Awards highlights the commitment and achievements of our global partners and trainers that have contributed to the information security community.”

Read more ...

Interested? See prices or call 78 79 16 53

Read more ...

Interested? See prices or call 78 79 16 53

1. Mobile Hacking and Digital Forensic Challenges

This is your introduction to the fundamental principles and methodologies used for legal forensics investigations

  • History of Digital Forensics
  • Global Legal System - Challenges
  • Technical Aspects of Mobile Forensics
  • Trace, Seize and investigate – Cyber Crime Case Scenarios
  • Criminal / Civil Incidents
  • Cyber Fraud
  • Insider / Unknown Threats
  • Recommended reading

Lab 1: Scenario Case Investigation

Lab 2: Evidence Analysis

After completing this module, you'll be familiar with:

  • Creating a new case using FTK and import case evidence
  • Standard Evidence storage acquisition of a hard disk
  • Using FTK and Caine Live CD for case evidence analysis and evidence priority
  • Exploring the difference of Physical vs. Logical Evidence Acquisition

2. Mobile Hardware Design for iPhone, BlackBerry, Android and other devices

This module will focus on the hardware design specifications of the popular mobile devices

  • Forensics Methodology
  • Why we need in-depth knowledge of the designs
  • iDevice teardown schematics (Ipad, Iphone and Ipad)
  • Android teardown schematics (HTC and Samsung)
  • Blackberry Bold teardown
  • Standard designs of other mobile devices
  • Mobile Hardware Tool Kits

Lab: Under the hood of an iPhone

After completing this module, you'll be familiar with:

  • Diving deep into the hardware aspects of mobile devices
  • Appreciating the different methods, techniques and tools involved

3. Mobile Software design and the common boot process for Smart Devices

Study how mobiles boot, and use architectural design components. You'll also learn how data is stored and accessed for the IOS system

  • Fundamental Open Source Software
  • Why specialize?
  • Mobile OSX Architecture
  • Core Definitions
  • UI Framework IOS
  • OSX Boot Overview
  • iPhone DFU – Recovery Modes
  • Android Boot Process
  • IOS Kernel Design
  • Jail-breaking / Rooting, REALLY? why, what and how

Lab: Jail-breaking and Rooting

After completing this module, you'll be familiar with:

  • Understanding Apple and Android Architecture
  • Appreciating UI Frameworks and IOS Kernel Design
  • Jail-breaking and rooting IOS and Android

4. Mobile Device Storage and Evidence Acquisition Techniques

This module explains how user data is stored and how to deal with deleted user evidence. It also describes the array of techniques that offer the greatest success for evidence acquisition

  • Analysis Open Source Tool and SDK Software kits for Apple and Android
  • Evidence Acquisition
  • Smart Phone Characteristics
  • Slack Space – Hidden Data
  • MBR – EFI Basic Storage Designs
  • Partitions and device specifics
  • Passcode Protection – Encrypted Backups

Lab 1: Binary Reality

Lab 2: Accessing Evidence

After completing this module, you'll be familiar with:

  • Using manual open-source evidence acquisition methods
  • Bypassing passcode protection
  • The importance of HEX editors
  • Primary unix commands and techniques used

5. Advanced Mobile Attack Analysis

This module explains the genre and advanced Mobile Attacks

  • How Mobile Devices get Hacked
  • Debuggers and Decompiles
  • Reverse Engineering
  • IPA and APK Packages
  • iPhone App Store Specifics

Lab 1: Hacking Tools and Analysis

Lab 2: Building our Environment

After completing this module, you'll be familiar with:

  • Analyzing Real Threats
  • Using open source tools and techniques

6. Mobile Device Hacking Techniques and Tools

This module explains how to analyze evidence and produce detailed evidence reports. It also describes how technical savvy people can obscure evidence to negate or destroy the evidence

  • Hacking can kill you
  • Threat Predictions 2011 / 2012
  • Mobile Hacking Techniques
  • IOS Platform Weaknesses
  • Android Platform Weaknesses
  • Blackberry Platform Weaknesses

Lab 1: Popular Software for Analysis

After completing this module, you'll be familiar with:

  • Understanding Hacking Techniques and Tools.
  • Launching Spear Phishing Attacks.
  • Planting Hidden Payloads

7. Penetration Testing and Exploitation Vectors

This module explains the Penetration Testing training Life Cycle. It also describes the tools and techniques we can use for exploitation Vectors

  • Information Gathering
  • Manual Exploitation
  • Exploit Frameworks
  • Cracking Passwords

Lab 1: Pen Test 101

Lab 2: Pen Test Model - BlueTooth Hacking

Note: This module is designed to be 100% hands-on covering the penetration testing methodology by utilizing BackTrack v5r1

8. Mobile Forensic Hardware and Software Field Kits

This module explains Forensics Hardware Options. It also describes how we can build our portable Forensics field kits

  • DIY Toolkit Options and costs
  • Commercial Comparisons
  • Pros and cons of open source
  • Field Kit Review and best practices

Lab 1: Tag and Bag

Lab 2: Building our Forensic Station and Toolkit

After completing this module, you'll be familiar with:

  • Using open source tools and techniques
  • Using commercial packages
  • Critical aspects related to Chain of Custody, documentation and protection of evidence techniques

9. Forensic Software, Evidence Analysis and Reporting

This module explains how to wrap-up the case by compiling the report and focuses on presenting the technical results in Laymen terms

  • Disclaimer/ Legal
  • Introduction to software packages
  • Forensics Reports
  • Best Evidence Rule
  • Evidence Report Documentation

Lab 1: Creating the Report

After completing this module, you'll be familiar with:

  • Categorizing Evidence
  • Evidence Tampering
  • The various software used

Read more ...

Interested? See prices or call 78 79 16 53

You'll sit the following exam at the Firebrand Training Centre, covered by your certification guarantee:

  • CAST 612 - Certified in Advanced Mobile Hacking & Forensics

Read more ...

Interested? See prices or call 78 79 16 53

Official EC-Council Courseware

  • CAST 612 - Advanced Mobile Hacking & Forensics

Firebrand Training offers top-quality technical education and certification training in an all-inclusive course package specifically designed for the needs and ease of our students. We attend to every detail so our students can focus solely on their studies and certification goals.

Our Accelerated Learning Programmes include:

  • Intensive Hands-on Training Utilising our (Lecture | Lab | Review)TM Delivery
  • Comprehensive Study Materials, Program Courseware and Self-Testing Software including MeasureUp *
  • Fully instructor-led program with 24 hour lab access
  • Examination vouchers **
  • On site testing ***
  • Accommodation, all meals, unlimited beverages, snacks and tea / coffee****
  • Transportation to/from designated local railway stations
  • Examination Passing Policy

Our instructors teach to accommodate every student's learning needs through individualised instruction, hands-on labs, lab partner and group exercises, independent study, self-testing, and question/answer drills.

Firebrand Training has dedicated, well-equipped educational facilities where you will attend instruction and labs and have access to comfortable study and lounging rooms. Our students consistently say our facilities are second-to-none.

Firebrand goes digital

We’re currently migrating from printed to digital courseware. Some courseware is already available in digital, while other books remain in printed form. To find out if this course is digital, call us on 78 79 16 53.

There are several benefits of easy-to-use digital courseware: downloads are immediate, and you’ll always have your courseware available wherever you are. You won’t need to wait for a printed book to be delivered before you start learning – and it’s better for the environment. You can choose to download the courseware to your own device, or borrow one of ours.

Considering a Microsoft course? Always have the most up-to-date Microsoft digital courseware with ‘Fresh Editions’. This gives you access to all versions of digital courseware – you’ll receive updates and revisions of your textbook, at no charge, for the life of that course.

Examination Passing Policy

Should a student complete a Firebrand Training Program without having successfully passed all vendor examinations, the student may re-attend that program for a period of one year.  Students will only be responsible for accommodations and vendor exam fees.

Please note

  • * Not on all courses
  • ** Examination vouchers are not included for the following courses: PMI, GIAC and CISSP CBK Review. Exam vouchers may also not be included for Apprentices and will require a separate purchase by an employer due to Education and Skills Funding Agency guidelines.
  • *** On site testing is not included for our PMI, GIAC, CREST, CSX Practitioner or ITIL Managers and Revision Certification Courses
  • **** Accommodation not included on the CISSP CBK Review Seminar

Read more ...

Interested? See prices or call 78 79 16 53

You'll be expected to possess:

  • An understanding of Fundamental principles and process for digital forensics
  • Knowledge includes evidence acquisitions, examination analysis and final reporting
  • A minimum of 6 months Digital Forensics experience is recommended

Before attending this course, it’s also recommended that you have:

Are you ready to get certified in record time?

We interview all applicants for the course on their technical background, degrees and certifications held, and general suitability. If you get through this screening process, it means you stand a great chance of passing.

Firebrand Training is an immersive training environment. You must be committed to the course. The above prerequisites are guidelines, but many students with less experience have other background or traits that have enabled their success in accelerated training through Firebrand Training.

If you have any doubts as to whether you meet the pre-requisites please call 78 79 16 53 and speak to one of our enrolment consultants, who can help you with a training plan.

Interested? See prices or call 78 79 16 53

When

When do you want to sit your accelerated course?

Start

Finish

Status

Location

Book now

21/5/2018 (Monday)

23/5/2018 (Wednesday)

Finished

-

 

24/9/2018 (Monday)

26/9/2018 (Wednesday)

Wait list

Nationwide

 

5/11/2018 (Monday)

7/11/2018 (Wednesday)

Limited availability

Nationwide

 

17/12/2018 (Monday)

19/12/2018 (Wednesday)

Open

Nationwide

 

28/1/2019 (Monday)

30/1/2019 (Wednesday)

Open

Nationwide

 

11/3/2019 (Monday)

13/3/2019 (Wednesday)

Open

Nationwide

 

Reviews

We've currently trained 68.075 students in 12 years. We asked them all to review our Accelerated Learning. Currently,
96,69% have said Firebrand exceeded their expectations:

"I dont think Ive learned this much in 5 days before, and Ive got tons of more information to dig into. This really is accelerated training. I really prefer this way of learning over the traditional, slow style of learning. It is really intense, but you also learn a lot - dont expect any lazyness here! Be rested before you arrive, theres a lot of information to take in. The Firebrand staff is very nice and accomodating."
E.Ø.. - EC-Council Certified Ethical Hacker (CEH) (5 days) (4/7/2016 to 8/7/2016)

"Good teachers make accelerated learning possible!"
Peder Illum, MedCom. - EC-Council Certified Ethical Hacker (CEH) (5 days) (11/4/2016 to 15/4/2016)

"Brilliant teacher, high speed education in a well working testenvironment."
Tom Thomsson . - EC-Council Certified Ethical Hacker (CEH) (5 days) (1/2/2016 to 5/2/2016)

"Would definitely recommend Firebrand to fellow work mates and friends. Super educational experience where everything that can be done to made you feel comfortable and immersed in an academic environment is done. Its the real deal and I wouldnt hesitate coming back for another course. Bring on the next course certification. "
I.R.. - EC-Council Certified Ethical Hacker (CEH) (5 days) (1/2/2016 to 5/2/2016)

"CEH course is very exciting and give you a 5 days journey in high level stuff."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (1/2/2016 to 5/2/2016)

"Excellent condensed training. A lot of subjects covered in small time."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (1/2/2016 to 5/2/2016)

"An excellent training to systemize your knowledge and learn from experts in the information security field."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (2/11/2015 to 6/11/2015)

"Good, funny and knowledgeable instructor. Nice accommodations and friendly staff."
S.B.F.. - EC-Council Certified Ethical Hacker (CEH) (5 days) (2/11/2015 to 6/11/2015)

"I had a great time, lots of fun. But brace yourselves, information overflow and sleepless nights are coming."
Oliver Rickfors . - EC-Council Certified Ethical Hacker (CEH) (5 days) (2/11/2015 to 6/11/2015)

"Intense studying gives good results, highly recommend!"
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (24/8/2015 to 28/8/2015)

"Fast paced course allowing you to save time but only appropriate if you have the right background knowledge and energy."
Francisco Blas Izquierdo Riera , Coresec Systems AB. - EC-Council Certified Ethical Hacker (CEH) (5 days) (24/8/2015 to 28/8/2015)

"Hard week on CEH, I was a little misplaced, but I had so much fun and I have learned a lot anyway. I it has defiantly given me the information I need to carry out my work. "
Thomas Bonde Ejby , AXVICE. - EC-Council Certified Ethical Hacker (CEH) (5 days) (24/8/2015 to 28/8/2015)

"brilliant training provider. would definitely come back!"
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (24/8/2015 to 28/8/2015)

"Intensive and filled with info that will keep one busy for the coming weeks."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (4/5/2015 to 8/5/2015)

"Could be shorter, but overall a great experience."
Johan Bogg , Iftac AB. - EC-Council Certified Ethical Hacker (CEH) (5 days) (4/5/2015 to 8/5/2015)

"It was a very high tempo, but I have learnt a lot! Would definitely go here again."
Marcus Persson , Sigma. - EC-Council Certified Ethical Hacker (CEH) (5 days) (2/2/2015 to 6/2/2015)

"Purely proffesional, my best certification experience by a mile. Will do it again"
Jahmai Enime , CoreLogic. - EC-Council Certified Ethical Hacker (CEH) (5 days) (3/11/2014 to 7/11/2014)

"Sundsgården and Firebrand staff ROCKS. "
Peder Illum , Medcom. - EC-Council Certified Ethical Hacker (CEH) (5 days) (3/11/2014 to 7/11/2014)

"NICE STAFF! Good food and accommodation. "
Andreas Lindkvist . - EC-Council Certified Ethical Hacker (CEH) (5 days) (3/11/2014 to 7/11/2014)

"Absolutely perfect."
Stefan Karjalainen , Atea Sverige. - EC-Council Disaster Recovery Professional Certification (5 days) (15/9/2014 to 19/9/2014)

"Very much Worth it"
Jens Arnfelt , -. - EC-Council Certified Ethical Hacker (CEH) (5 days) (5/5/2014 to 9/5/2014)

"Like Nike says, "Just do it"!"
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (3/2/2014 to 7/2/2014)

"First time on a Firebrand course. Great concept. Would recommend to others."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (2/9/2013 to 6/9/2013)

"Its hard but its worth it"
Bjarne Warming . - EC-Council Certified Ethical Hacker (CEH) (5 days) (2/9/2013 to 6/9/2013)

"The course provided me with the right knowledge to get the job done."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (2/9/2013 to 6/9/2013)

"Simply great training!"
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (2/9/2013 to 6/9/2013)

"If you know what you want & are passionate about hacking this is the place to be"
Caj Abrahamsson, Betsson. - EC-Council Certified Ethical Hacker (CEH) (5 days) (4/3/2013 to 8/3/2013)

"Intense - time flyes when you are having fun."
Lars Fischer , The Danish Board of Technology. - EC-Council Certified Ethical Hacker (CEH) (5 days) (14/5/2012 to 18/5/2012)

"Very good intensive training. Good hands-on training"
Anonymous, Ficora NCSA-FI - EC-Council Certified Ethical Hacker (CEH) (5 days) (14/5/2012 to 18/5/2012)

"Awesome training and personell. Wonderful to be able to loose yourself in the subject. "
Thomas Eriksen, FDE A/S. - EC-Council Certified Ethical Hacker (CEH) (5 days) (14/5/2012 to 18/5/2012)

"Nice to get to an isloated studyplace, and to focus 100% on the material. Good teacher, with experiance from the realworld."
Nils Bystrom , Uppsala University. - EC-Council Certified Ethical Hacker (CEH) (5 days) (13/2/2012 to 17/2/2012)

"Great training and a great instructor who often uses real worldscenarios, and not only training material."
Giuliano Maras, Onevinn AB. - EC-Council Certified Ethical Hacker (CEH) (5 days) (13/2/2012 to 17/2/2012)

"Great training with everything needed. I was able to concentrate on training with no distractions."
Grant Gibson, AGI Media. - EC-Council Certified Ethical Hacker (CEH) (5 days) (9/7/2018 to 13/7/2018)

"The instructor has a very good knowledge and experience on the training subjects. The training was over my expectation and I hoped I had visited such training in the past."
Anonymous - EC-Council ECSA (5 days) (25/6/2018 to 29/6/2018)

"Appreciated the fact that the instructor clearly had wide ranging knowledge around all the topics covered and brought the course to life with great enthusiasm."
Richard Pople, Virgin Media. - EC-Council ECSA (5 days) (25/6/2018 to 29/6/2018)

"Usual good training, helps with everything being located on site. "
Anonymous - EC-Council ECSA (5 days) (25/6/2018 to 29/6/2018)

"Great instructor, who worked really hard to help us learn and develop after the course."
Andrew Moore, University of London. - EC-Council Certified Ethical Hacker (CEH) (5 days) (4/6/2018 to 8/6/2018)

"Now on my fifth course with Firebrand. Feeling tired now, but definitely worthwhile."
Jonathan Freedman , Howard Kennedy. - EC-Council Certified Ethical Hacker (CEH) (5 days) (4/6/2018 to 8/6/2018)

"The trainer has been a very good. He has managed to make the course very interesting, providing his experience and real use cases. I'd recommend taking a course with him."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (4/6/2018 to 8/6/2018)

"Really enjoyed my second time here - really educational with lots of information, tools and help."
J.G.. - EC-Council Certified Ethical Hacker (CEH) (5 days) (4/6/2018 to 8/6/2018)

"Extraordinary good trainer! He was skilled, well educated and made course material a lot more understandable by giving examples from his own professional experience. The training itself was well prepared and well organized."
Malte Fiedler , T-Systems. - EC-Council Certified Network Defender (CND) (4 days) (28/5/2018 to 31/5/2018)

"Courses are given in an interactive way by a highly qualified trainer which makes the courses very lively and interesting to follow."
Anonymous - EC-Council Certified Network Defender (CND) (4 days) (28/5/2018 to 31/5/2018)

"This was my first Firebrand course, I found it intense but very rewarding when I successfully passed at the end of the week. "
Richard Matthew, Lloyds Banking Group. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/4/2018 to 4/5/2018)

"Fantastic training, very long hours but worth it in the end. Will be booking my next course here."
Ian Lindley, Innogy Business Services. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/4/2018 to 4/5/2018)

"Extremely good knowledgeable trainer, good course great location to the hotel. I feel like I have learnt a lot in the 5 days that I have been here ."
Mark Ben Langley, NMI metrology and gaming . - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/3/2018 to 3/4/2018)

"Our instructor is incredible, cant say I've ever learned more on a course. We covered the course material but he added real life experience for pen testing which is invaluable. He is great at motivating people."
A.M. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/4/2018 to 4/5/2018)

"Fantastic course delivered by a true expert."
Andrew Starr, OpenIP Ltd. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/4/2018 to 4/5/2018)

"As the first external training by the company, i can report back and give some very positive feedback :-)"
Steven Davies, S-Connect. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/3/2018 to 3/4/2018)

"In short it was a very pleasant stay at the hotel, and the instructor was great."
Anonymous - EC-Council Computer Hacking Forensics Investigator (CHFI v9) (5 days) (16/4/2018 to 20/4/2018)

"Great experience, intense at time but worth it. Enjoyed all the hands on experience "
Enda Dorrian, NS + I. - EC-Council Certified Ethical Hacker (CEH) (5 days) (9/4/2018 to 13/4/2018)

See prices