Digital Forensics and Internet of Things

(WU-SEC360.AE1)
Lessons
Lab
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Mobile Operating System

  • Operating System Fundamentals
  • iOS Basics
  • File System
  • Hardware Details
  • iphone Security
  • Lesson Summary
  • Android Basics
  • Specialized Key Codes
  • Working with Android
  • ADB
  • Rooting Android
  • EDL Mode
  • Operating System Details
  • Boot Process
  • File Systems
  • Security
  • General Architecture
  • Tools
  • Deep Into Android Code
  • Lesson Summary
2

Mobile Forensics

  • Forensic Procedures
  • iOS Specific Processes
  • Lesson Summary
  • ADB
  • Android Only Tools
  • Dual Use Tools
  • Oxygen Forensics
  • MobilEdit
  • Android App DECOMPILING
  • Lesson Summary
3

SQLite Database Forensics and Anti-Forensics

  • Relational Databases
  • SQLite Basics
  • Other Viewers
  • Lesson Summary
  • Introduction
  • Phone Locking
  • Steganography
  • Cryptography
  • Password Cracking
  • Lesson Summary
4

Legal Challenges and Forensic Models for IoT Investigations

  • Introduction
  • Rules of Evidence
  • Warrants
  • Ethics
  • Types of Investigations
  • Private Investigator Licenses
  • The Scientific Method
  • The Forensic Report
  • Quality Control
  • Lesson Summary
  • Introduction
  • Application of AI for Different Purposes in Forensic Science
  • Future of AI
  • Challenges While Implementing AI
  • Conclusion
5

A Unified Framework for IoT Mobility Forensics and Scientific Digital Examination

  • Introduction
  • Smart Device and IoT
  • Relation of Internet of Things with Mobility Forensics
  • Mobility Forensics IoT Investigation Model
  • Internet of Things Mobility Forensics: A Source of Information
  • Drawbacks in IoT Devices Data Extraction
  • Future Perspective of Internet of Things Mobility Forensics
  • Conclusion
  • Introduction
  • Internet of Things
  • IoT Architecture
  • Characteristics of IoT
  • IoT Security Challenges and Factors of Threat
  • Role of Digital Forensics in Cybercrime Investigation for IoT
  • IoT Security Steps
  • Conclusion
6

IoT Sensor Security and VANET Forensics: A Chain of Custody Model

  • Introduction
  • Cybersecurity Versus IoT Security and Cyber-Physical Systems
  • The IoT of the Future and the Need to Secure
  • Security Engineering for IoT Development
  • Building Security Into Design and Development
  • Security in Agile Developments
  • Focusing on the IoT Device in Operation
  • Cryptographic Fundamentals for IoT Security Engineering
  • Cloud Security for the IoT
  • Conclusion
  • Introduction
  • Cluster Performance Parameters
  • Routing Protocols in VANET
  • Internet of Vehicles
  • IoT Forensic in Vehicular Ad Hoc Networks
  • Conclusion
7

IoT Forensics: Interconnection Frameworks and Emerging Threat Repercussions

  • Introduction
  • The Need for IoT Forensics
  • Various Types of Evidences Encountered
  • Protocols and Frameworks in IoT Forensics
  • IoT Forensics Process Model
  • Suggestive Solutions
  • Conclusion
  • Introduction: Challenges in IoT Forensics
  • Scope of the Compromise and Crime Scene Reconstruction
  • Device and Data Proliferation
  • Multiple Data Location and Jurisdiction Challenges
  • Device Type
  • Lack of Training and Weak Knowledge Management
  • Data Encryption
  • Heterogeneous Software and/or Hardware Specifications
  • Privacy and Ethical Considerations by Accessing Personal Data
  • Lack of a Common Forensic Model in IoT Devices
  • Securing the Chain of Custody
  • Lifespan Limitation
  • The Cloud Forensic Problem
  • The Minimum or Maximum Period in Which Data is Stored in the Cloud
  • Evidence Analysis and Correlation
  • Conclusion

1

Mobile Operating System

  • Downloading and Installing 3uTools
  • Jailbreaking an iPhone Exploring Customization and Risks
  • Ensuring Evidence Integrity by Setting a Secure Passcode on iPhone
  • Using Specialized Key Codes
  • Using Android Studio to Create an Android Virtual Device
  • Accessing a Device Using ADB
  • Understanding File Systems
2

Mobile Forensics

  • Using iMazing to Backup iPhone for Money Fraud Case
  • Recovering a Lost Forensic Document with UltData
  • Investigating Insider Data Theft in a Medical Lab with Dr.Fone
  • Utilizing iMyFone D-Back for Data Recovery
  • Investigating Audio Evidence Transfer Using ADB
  • Understanding Android Tools
  • Decompiling and Analyzing an Android App
3

SQLite Database Forensics and Anti-Forensics

  • Managing Databases and Executing Queries in the SQLite Browser
  • Hiding Text using Steganography
  • Using DeepSound
  • Generating and Storing File Hashes
  • Performing Asymmetric Encryption
  • Performing Symmetric Encryption
4

Legal Challenges and Forensic Models for IoT Investigations

  • Completing the Chain of Custody
  • Completing the Chain of Custody Form
  • Training an AI Model to Recognize Patterns
  • Creating a Chatbot or AI Assistant for Helping Forensic Teams
5

A Unified Framework for IoT Mobility Forensics and Scientific Digital Examination

  • Simulating Sensor-to-Processor Communication in a Smart Device
  • Simulating a MitM Attack on IoT Device Communication
  • Recreating a Forensic Case Study Using IoT Logs
  • Simulating Logical Data Extraction from a Smartphone
  • Capturing and Analyzing Communication From IoT Devices
  • Identifying a Cyber Attack via Anomaly Detection
6

IoT Sensor Security and VANET Forensics: A Chain of Custody Model

  • Detecting Log Tampering Using SHA-256
  • Securing IoT Data Using AES and RSA
  • Detecting Public S3 Buckets Storing IoT Data

Related Courses

All Courses
scroll to top