Android Forensics Essential Training
3.2 (3 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
16 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Android Forensics Essential Training to your Wishlist.

Add to Wishlist

Android Forensics Essential Training

Getting Started with Android Forensics Beginner
3.2 (3 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
16 students enrolled
Created by Ankur Singh
Last updated 1/2017
English
Current price: $10 Original price: $20 Discount: 50% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 1 hour on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Over 18 lectures and 2 hour of content
  • Recover deleted files from android
  • Forensic Analysis of Android Applications
View Curriculum
Requirements
  • Basic IT Skills
  • Working Internet Connection
Description

The smart phone market is growing higher and higher. With the drastic changes in technology, smart phones are becoming targets of criminals. Because of the fact that most of the people are completely addicted to the mobile devices to do our daily tasks, ranging from setting up a reminder to wish our dear ones well on special occasions, to online banking transactions, mobile devices contain a lot of sensitive data which is of an investigator’s interest. As Android is one of the leading smart phone operating systems, it it is important to have knowledge of Android forensics.Android forensics is different from regular disk forensics because of various reasons. It supports various file systems which are specific to Android. We may look for the following data on Android devices: SMS, MMS, emails, call logs, contacts, photos, calendars, notes, browser history, GPS locations, passwords, data stored on SD cards, etc.It is important to understand file systems, directory structures, and how and where the data is stored on the devices before getting into actual forensics.

Who is the target audience?
  • Students
  • Web Developer
  • Security testers
  • IT Security Professionals
  • Anyone Who Interested In Securing Security
Students Who Viewed This Course Also Viewed
Curriculum For This Course
+
Chapter 1. Introducing Android Forensics
1 Lecture 03:18
+
Chapter 2. Setting Up an Android Forensic Environment
1 Lecture 05:17
+
Chapter 3. Understanding Data Storage on Android Devices
1 Lecture 03:41
+
Chapter 4. Extracting Data Logically from Android Devices
3 Lectures 07:37
Manual ADB data extraction
02:46

Bypassing Android lock screens
02:55

Cracking an Android pattern lock
01:56
+
Chapter 5. Extracting Data Physically from Android Devices
4 Lectures 10:09
Chapter 5. Extracting Data Physically from Android Devices
01:29

Extracting data physically with dd
03:26

Acquiring Android SD cards
01:37

Acquiring sim card data
03:37
+
Chapter 6. Recovering Deleted Data from an Android Device
2 Lectures 04:31
Chapter 6. Recovering Deleted Data from an Android Device
00:50

Recovering data deleted from internal memory
03:41
+
Chapter 7. Forensic Analysis of Android Applications
5 Lectures 18:11
Chapter 7. Forensic Analysis of Android Applications
01:00

Contacts/call analysis SMS/MMS analysis
08:04

Gmail analysis
02:33

Facebook analysis
03:11

WhatsApp analysis
03:23
About the Instructor
Ankur Singh
3.2 Average rating
207 Reviews
7,555 Students
7 Courses
Engineer

Hello there, I am ankur singh , with over 4 Years experience in Ethical Hacking, Penetration Testing, Malware Reverse Engineering, Forensics, Securing Websites and Servers.

e Found and Reported Many Security Vulnerabilities in Facebook, Microsoft, Adobe, Apple, AT&T, RedHat, SoundCloud, GitHub, Etsy, Nokia .

Also having some global certification like Ceh, Ecsa, CCNA, GIMS.