In this training, you will learn
- How to use basic and advanced methods of iOS acquisition, such as checkm8-based and agent-based acquisition
- How to acquire iOS data from the cloud
- How to analyze iOS apps, including encrypted ones
- Which iOS system files may be of interest for a DFIR investigation and how to analyze them
- [LE only] How to use Belkasoft X Brute-Force tool to unlock certain models of iPhone and iPad devices