Cyber Securities Technology Logo Cyber Security Technologies Corporation (CST) is the innovation leader in affordable software products for computer investigations. CST was formed by industry veterans who see the need for new investigative tools designed for the changing investigative environment. We are dedicated to delivering technically advanced but easy-to-use software products for corporations, government agencies, service providers and law enforcement, as well as related training and certification. CST is an affiliate of Architecture Technology Corporation, a technology company specializing in software-intensive solutions for complex problems in IT security and high-security network computing applications. Learn more...


Photo

Training


OnLineDFS Training | P2P Marshal Training | Mac Marshal Training

Cyber Security Technologies Software Training Program

Training is currently available in peer-to-peer forensics, Mac OS X forensics and live computer investigations.

Mac OS X Forensics and MacMarshal Training

Duration: One-Day Course

Who should attend?

  • Local, state and federal law enforcement
  • Forensic investigators
  • Private investigators
  • Corporate IT security professionals
  • Security auditors
  • Data assurance staff
We offer a one-day training course on Mac OS X forensics and Mac Marshal. The course includes:
  • Overview of Mac OS X, including virtual machine and dual-boot operation of Macs
  • Review of Mac disk formats and the HFS+ file system
  • Discussion of FileVault home directory encryption
  • Usage of Spotlight to perform rapid searches of forensic data
  • Detailed descriptions of common application data/cache formats on OS X
  • Analysis of forensic data written by the OS and programs such as Safari, Address Book & Mail
  • Hands-on exercises using Mac Marshal
  • Certification
Through hands-on training, students will use learn to:
  • Analyze Mac OS X and dual-boot disk images
  • Analyze configuration and log files from common OS X applications, such as Mail, Safari, iChat, and Address Book
  • Perform rapid searches using Spotlight metadata
  • Gather comprehensive machine usage info
  • List detailed information about every iPod and iPhone that has been connected to the machine
  • Detect and extract VMWare, Parallels, and Virtual Box virtual machine images
  • Detect and analyze FileVault-encrypted user directories
  • Maintain an audit trail and generate detailed reports in RTF, PDF, and HTML formats

Training Schedule

No training courses are scheduled at this time.

If you are interested in hosting a training program at your facility, please contact training@cyberstc.com