ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

To trust or not to trust: The relationship between you your mobile forensics tools

Автор: SANS Digital Forensics and Incident Response

Загружено: 2016-11-10

Просмотров: 2295

Описание: Webcast Description: Lets face it, when it comes to you and your smartphone forensic tool, there is no such a thing as a monogamous relationship. There are a plethora of mobile forensics tools available to make your job easier. And best of all, you get to pick the one to help you find what you are looking for. One might think that having these tools right on your fingertips is the key to finding key evidence, right? Think again. In this webcast, we will take a look at the strengths and the pitfalls of mobile forensics tools, we will show you when to trust or not trust their results but most importantly, how to rely on your own skills to conduct successful mobile device investigations.

Speaker: Heather Mahalik

Biography:
To say that digital forensics is central to Heather Mahalik’s life is quite the understatement. Heather has worked on high-stress and high-profile cases, investigating everything from child exploitation to Osama Bin Laden’s media. She has helped law enforcement, eDiscovery firms, and the federal government extract and manually decode artifacts used in solving investigations around the world. All told she has more than 14 years of experience in digital forensics, including eight years focused on mobile forensics – there’s hardly a device or platform she hasn’t researched or examined or a commercial tool she hasn’t used.

These days Heather is the Principal Forensic Scientist at ManTech CARD. At SANS Institute she is a senior instructor and the course lead for FOR585: Advanced Smartphone Forensics. As if that isn’t a full enough schedule, Heather also maintains www.smarterforensics.com, where she blogs and hosts work from the digital forensics community. She is the co-author of Practical Mobile Forensics (1st and 2nd editions), currently a best seller from Pack't Publishing, and the technical editor for Learning Android Forensics from Pack't Publishing.

Heather’s background in digital forensics and e-discovery covers smartphone, mobile device, and Windows forensics, including acquisition, analysis, advanced exploitation, vulnerability discovery, malware analysis, application reverse-engineering, and manual decoding, as well as instruction on mobile devices, smartphones, and computers covering Windows, Linux and Macintosh operating systems.

Take FOR585 Advanced Smartphone Forensics in a city near you. Check out the next course runs here: sans.org/FOR585

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
To trust or not to trust: The relationship between you   your mobile forensics tools

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

SANS DFIR Webcast - APT Investigations -- How To The Forensic Side

SANS DFIR Webcast - APT Investigations -- How To The Forensic Side

Stay Ahead of Ransomware - Ransomware and Cyber Extortion on the Rise in the Cloud

Stay Ahead of Ransomware - Ransomware and Cyber Extortion on the Rise in the Cloud

Building your Android Application Testing Toolbox

Building your Android Application Testing Toolbox

AI-Powered Ransomware: How Threat Actors Weaponize AI Across the Attack Lifecycle

AI-Powered Ransomware: How Threat Actors Weaponize AI Across the Attack Lifecycle

How I animate 3Blue1Brown | A Manim demo with Ben Sparks

How I animate 3Blue1Brown | A Manim demo with Ben Sparks

Stay Ahead of Ransomware - Threat Hunting for Ransomware and Cyber Extortion

Stay Ahead of Ransomware - Threat Hunting for Ransomware and Cyber Extortion

Лекция от легенды ИИ в Стэнфорде

Лекция от легенды ИИ в Стэнфорде

Эти мышцы запрещено растягивать каждому! Никогда не растягивай эти мышцы!

Эти мышцы запрещено растягивать каждому! Никогда не растягивай эти мышцы!

Politics Chat, March 12, 2026

Politics Chat, March 12, 2026

Stay Ahead of Ransomware: Proper Incident Containment… and Horror Stories

Stay Ahead of Ransomware: Proper Incident Containment… and Horror Stories

Мозг и его возможности. Татьяна Черниговская

Мозг и его возможности. Татьяна Черниговская

Фильм Алексея Семихатова «ГРАВИТАЦИЯ»

Фильм Алексея Семихатова «ГРАВИТАЦИЯ»

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

💥Иран НАПРЯМУЮ пригрозил Украине! ФЕЙГИН | Мировой КРИЗИС только НАЧАЛСЯ, дальше САМОЕ интересное

💥Иран НАПРЯМУЮ пригрозил Украине! ФЕЙГИН | Мировой КРИЗИС только НАЧАЛСЯ, дальше САМОЕ интересное

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

MacOS telemetry vs EDR telemetry - Which is better?

MacOS telemetry vs EDR telemetry - Which is better?

Constructions - GCSE Maths

Constructions - GCSE Maths

Home automation and IoT as a source of evidence: Forensic analysis of Home Assistant

Home automation and IoT as a source of evidence: Forensic analysis of Home Assistant

Биология поведения человека. Лекция #1. Введение [Роберт Сапольски, 2010. Стэнфорд]

Биология поведения человека. Лекция #1. Введение [Роберт Сапольски, 2010. Стэнфорд]

Digital forensics and security: Automate audits, investigations and response with AWX and Ansible

Digital forensics and security: Automate audits, investigations and response with AWX and Ansible

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]