![]() ![]() The KnowledgeC database stores a wealth of information about the macOS usage as well as user activity. Having access to precise and granular user and application usage can be extremely useful in a forensic investigation. ![]() This module will cover several macOS log files such as the unified logs, configuration files, file/folder permissions, daily logs, USB connection history, and other key logging artifacts to track user access of information.In this module students will discuss encryption issues such as FileVault2 and methods that can be taken to brute force this technology using Passware.Several key operating system artifacts for macOS will be covered including Finder, File System Events, Sidebar items, Trash Items, Installed Applications, and more.Students will also discuss proper handling techniques for macOS devices. Including changes to the security of macOS devices including the T2 chips, SIP, and other security protocols being used by Apple. This module will walk through information on the macOS operating system and APFS file system.This module will introduce the course to students as well as cover the scenario that will be followed over the four-day training.MODULE 1: INTRODUCTION AND COURSE OVERVIEW ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |