Forensic seizure of digital traces, including data from mobile devices

  • Target group: Public organisations, Small businesses, Medium-sized enterprises
    Type of service: Skills and Education
    Label: New, Recommended
    Realization: Onsite
  • ​- learn about the most common types of digital footprints
  • - get to know their specific characteristics
  • - learn how to analyze seized data

No description

Explore the world of digital footprints and learn how to properly secure and analyze them. Participants will learn how to use specialized hardware and software to forensically clean digital footprints from a variety of devices, including mobile phones.

No description

What is the first step?
Use the form below to contact us. We will get back to you soon.

No description

How much time is required?
The course will last 16 hours.

Digital traces have specific characteristics based on their intangible nature. In order to properly secure digital traces, it is necessary to acquire a range of knowledge and procedures to ensure the integrity of the digital trace and its unquestionability for any further criminal, civil or labour law proceedings. In addition to conventional storage devices, mobile devices must also be taken into account as they are nowadays the primary source of digital traces. The vast majority of an individual's communications, historical location data, photographs, scans, documents and a wide range of other important information can be found in the memory of mobile devices.

This training will introduce participants to digital traces and teach them the procedures for properly securing them from live systems and storage media. Upon completion of the training, they will be able to take forensic images and work with them effectively. They will also learn how to use specialized hardware and software for forensically clean digital footprinting. In addition, they will gain knowledge of the workings of iOS and Android operating systems from a digital forensics perspective.

Contact us if you are interested

Loading...

FAQ

I. What is EDIH?

• European Digital Innovation Hubs, or EDIHs, help organisations with their digital transformation.
• They are being established in all EU member states thanks to the Digital Europe programme.
• One of these hubs is CyberSecurityHubcz, which is the only hub in the Czech Republic that deals primarily with cybersecurity.

II. Who will we be working with?

• The CyberSecurityHubcz consortium consists of 9 organisations.
• While some members are engaged in expert services in cybersecurity, business development partners are dedicated to the economic development of clients and serve as intermediaries between the consortium and clients.
• The governing organization is CyberSecurityHubcz itself.

III. What services do you offer?

  • • The services fall into four categories: test before invest, education and digital skills, innovation ecosystem and networking, and support in finding investments.
    • Within these categories, there are dozens of services of various types - from consulting to penetration testing.
    • The purpose of all services is to strengthen security and resilience.

IV. How to become a client?

  • • Use the contact form, e-mail info@cshub.cz or get in touch with one of our representatives – we attend a wide range of events and conferences.
    • We will then meet in person or online for an initial meeting. After discussing your needs and other issues, we can move on to signing the contract.
    • Whichever service you choose, you'll always also receive a digital maturity assessment of your organisation from us and long-term assistance for the duration of our project – at least until the end of 2025.

V. Should we be afraid of the administrative burden?

• There are not many administrative requirements. SMEs must have a profile in the Central register of de minimis aid and have sufficient funds available in their small scale public aid account. These conditions do not apply to public organisations.
• A contract must then be signed. A new contract is then concluded whenever you request our services again in the future.
• A proactive approach is required in the planning and implementation of the agreed services.

You are running an old browser version. We recommend updating your browser to its latest version.

More info