Android Forensics - Open Security Training ✦

: Setting up the forensic workstation (Linux, macOS, or Windows) and creating an Android Virtual Device (AVD) for practice.

: Setting up a penetration testing environment and performing reverse engineering on Android applications.

: Techniques for circumventing passcodes, obtaining temporary root access, and interacting with recovery modes and bootloaders. Android Forensics - Open Security Training

: Hands-on time with both open-source and commercial forensics tools like the Cellebrite UFED .

: Establish a foundation in mobile digital forensics, Android OS forensics, and application penetration testing. Duration : 2 days. Instructor : Shawn. : Setting up the forensic workstation (Linux, macOS,

The course provided by OpenSecurityTraining.info is a comprehensive two-day program designed to teach the fundamentals of extracting and analyzing data from Android devices. Course Overview

: Deep dive into the Android Security Model, Android Open Source Project (AOSP) architecture, and using ADB (Android Debug Bridge) shell. : Hands-on time with both open-source and commercial

: Basic understanding of Linux and Android development is recommended. Day 1: Setup & Acquisition