Apple devices that we must be aware of in order to perform forensic acquisitions
We have to walk before we can run. Apple devices are an entirely different platform than Windows, and there are many different considerations when preparing to acquire an Apple machine. Let's discuss some of these differences.
In these episodes you will learn to:
Understanding Apple acquisition differences to Windows
-Preparing for an Apple acquisition
-Addressing pre-existing security on Apple products
The topics covered in the videos below are just excerpts of what the FOR498: Battlefield Forensics & Data Acquisition course teaches. For more information or to register for the course visit here
The SANS 3MinMax series with Kevin Ripa is designed around short, three-minute presentations on a variety of topics from within Digital Forensics, Incident Response, and to a lesser degree, Information Security.
About the author: An investigator at heart, Kevin Ripa bought his first computer as a tool for writing reports for his private investigation agency. As he worked through typical user issues, the "why" of what was going wrong in his machine kept him up at night. So Kevin turned his investigative skills toward his computer and quickly became fascinated by the world inside of it. Now a 25-year veteran of the digital investigations field, Kevin's enthusiasm has not waned: "IT security and digital forensics still inspire me every day, and I can't wait to wake up in the morning and get to work!
"Kevin is a SANS Certified instructor and the co-author of the SANS course FOR498: Battlefield Forensics and Data Acquisition. For more information about the course, visit:http://www.sans.org/FOR498If you would like to suggest a topic for the next 3MinMax episodes, please email 3minmax@sans.org or reach out to Kevin via twitter at @kevinripa (https://twitter.com/kevinripa)
FOR498: Battlefield Forensics & Data Acquisition course
FOR498, a digital forensic acquisition training course, provides the necessary skills to identify the many and varied data storage mediums in use today, and how to collect and preserve this data in a forensically sound manner despite how and where it may be stored. It covers digital acquisition from computers, portable devices, networks, and the cloud. It then teaches the student Battlefield Forensics, or the art and science of identifying and starting to extract actionable intelligence from a hard drive in 90 minutes or less.
Demo the course here
Learn abut the course Certification (GBFA) here