Mobile Forensics
An introductory course on Mobile Forensics dissecting what to look for after an attack on mobile devices and how.
80 Hours
Blue Team
80 Hours
Blue Team


Mobile devices have become an integral part of our daily lives. We rely on them for everything, from socializing to keeping track of our important data, not just on a personal level but within organizations too. Our reliance on smart devices has made them a target for hackers, with mobile cybercrime on the rise over the last few years. All of this means that our mobile devices can be an important piece of evidence in any forensic investigation.

The course covers the following topics:


It’s important to improve the accordion’s behaviour

History of Mobile
  • 3G and the rise of Smartphones
  • Old operating systems Symbian, BlackBerry, Windows Phone
  • IOS Jailbreaks
  • The IOS root issue
  • IPA file
  • IOS permissions
  • The close garden
  • Android versions and fragmentation
  • The APK ‘s
  • The Manifest.xml file
  • Android Intent mechanism
  • Android App and what it can and cannot do
  • Android permissions
  • Understanding the root concept
  • Android file system
Understanding mobile forensics
  • File system forensics
    • Pictures
    • Files
    • Notes
    • OS Logs
  • Application static forensics
    • Code
    • Databases
    • Logs
    • Permissions
  • Application dynamic analysis
    • Network
    • Syscalls
    • Abnormal activities
  • The tools of the trade
  • Final challenge
Don't touch this tab

SOTERIA Global is a global leader in cyber-security training solutions and services.

The cyber world is now a part of our everyday life. New technology emerges daily, and as opportunities increase, so do cyber risks. Threats constantly evolve, and we must protect our valuable assets.

A successful cyber defense has many factors, but they all have one thing in common: dedicated, skilled individuals.

SOTERIA Global experts develop our solutions and rely on the best technological assets in the market. Our impressive global presence expands over four continents, giving us access to the best cybersecurity professionals.

Our solutions range from customized training programs to developing cyber-oriented facilities, ensuring that individuals and organizations are ready to face real-world threats. Over the years, we have worked with various organizations across many sectors, giving us the skillset to shape and adapt our solutions to meet our client’s needs.

    • Forensic experts
    • Linux, knowledge of C an advantage
    • Knowledge on mobile artifacts, using mobile forensic tools, conducting a forensic investigation