Mobile Forensics
An introductory course on Mobile Forensics dissecting what to look for after an attack on mobile devices and how.
80 Hours
Blue Team
80 Hours
Blue Team


Mobile devices have become an integral part of our daily lives. We rely on them for everything, from socializing to keeping track of our important data, not just on a personal level but within organizations too. Our reliance on smart devices has made them a target for hackers, with mobile cybercrime on the rise over the last few years. All of this means that our mobile devices can be an important piece of evidence in any forensic investigation.

The course covers the following topics:


It’s important to improve the accordion’s behaviour

History of Mobile
  • 3G and the rise of Smartphones
  • Old operating systems Symbian, BlackBerry, Windows Phone
  • IOS Jailbreaks
  • The IOS root issue
  • IPA file
  • IOS permissions
  • The close garden
  • Android versions and fragmentation
  • The APK ‘s
  • The Manifest.xml file
  • Android Intent mechanism
  • Android App and what it can and cannot do
  • Android permissions
  • Understanding the root concept
  • Android file system
Understanding mobile forensics
  • File system forensics
    • Pictures
    • Files
    • Notes
    • OS Logs
  • Application static forensics
    • Code
    • Databases
    • Logs
    • Permissions
  • Application dynamic analysis
    • Network
    • Syscalls
    • Abnormal activities
  • The tools of the trade
  • Final challenge
Don't touch this tab

About CYBERPRO was founded in cooperation with international information security and instruction authorities who bring to Israel world-leading cyber training technologies and a learning experience of the highest standard available today.

The partners include the IITC group which has been training graduates for the high tech industry for over 20 years, and was selected as the training center for the Cisco Company in Israel.

CYBERPRO’s advanced, sought-after training courses in the areas of infrastructures, information security and cyber are world famous. These training courses were developed by some of the best cyber experts in the world, for international security organizations that emphasize the high training capabilities, the professional learning methods and the unique training and practice technologies. Our connection with international groups allows our students to be exposed to unique employment opportunities in Israel and abroad.

The training and learning tracks are all based much hands-on practice and preparation for the industry and profession requirements, so they include technological labs and practice sessions using one of the most advanced simulators in the world.

    • Forensic experts
    • Linux, knowledge of C an advantage
    • Knowledge on mobile artifacts, using mobile forensic tools, conducting a forensic investigation