Join Kim Bradley, forensic consultant, as she shows you how to acquire data from cloud sources using different methods, such as user credentials and login tokens from mobile extractions.
Each login method will allow you to acquire different types of data, so you’ll learn what data is available and how to quickly process acquired data from sources such as Apple, Facebook, Google, Instagram, and Twitter using these differing methods.
Data from cloud sources can be a critical aspect of your case and waiting for warrant returns can delay case progress. Knowing what cloud data can be accessed via live acquisition can help support search warrant requests early in an investigation.
After viewing this webinar you will be issued a certificate by email documenting that you have taken part in the session.