Enable your team

Train your team with the latest methods, hardware, and software systems used in digital forensics today to access computers, laptops and mobile devices.

Mobile Forensics Training

Chip Off Training

Chipoff Training

_

Advanced chip-off training allows you to perform forensics on BGA memory chips on mobile devices. This technical course provides students with the technical know how allowing them to:

  • Remove BGA chips from devices
  • Handle the chip to be read
  • Apply tools to decode the data
  • Live practical example of mobile phones
  • Use forensic software to receive the data
  • Learn fundamentals of memory structure

JTAG Forensics

Camera Coverage Modeling

_

JTAG (Joint Test Action Group) Forensics is data acquisition process that is achieved by connecting to Test Access Ports (TAPs) on mobile devices whereby an trained individual can pull raw data stored on the memory chips and later analyze it use advanced tools. In this course learn how to:

  • Use JTAG technique to recover data
  • Learn how to access locked or damaged phones
  • Disassembly and assembly of devices
  • Solder your own connections to devices
  • Identify TAPs
  • Use scripts to recover pin locks
  • Use commercial looks with JTAG dumps

Computer Forensics Training

_
Entities, Government organizations, and forensics service providers are establishing in house digital forensics teams to manage internal incidents to be inline with their respective Information security policies. Anytech can help your employees get the necessary training that would enable your team to acquire and analyze forensics data and present it as digital evidence as per the international standards. Contact our experts and request a cost free consultation to find out whats the right level of training course for you.

Computer Data Acquisition

Chipoff Training

_

Data acquisition is the first stage of digital forensic that you need to master before inspecting the data within. The market offers a wide variety of data acquisition systems that are used for commercial reasons such disk cloning and forensics. Anytech has partnered with the leading disk acquisition system providers ensuring that your training using the best of breed technology. This technical course provides students with the technical know how allowing them to:

  • Learn about disk drives, their composition and how they are partitioned.
  • Learn how data is stored and accessed
  • Acquire data from different devices
  • Acquire devices using different connections
  • Acquire deleted data
  • Apply international data acquisition standards to be presented in the court of law.

Data Recovery and Analysis

Chipoff Training

_

The second stage of forensics is inspecting the acquired data. This course takes a technical dive into how data is analyzed covering:

  • Mount acquired data to forensics system
  • Use software tools to view the data
  • Access deleted data
  • Apply international data analysis methodology
  • How to create a case file and to manage the results
  • Calculate MD5 Sum of acquired data

Value Added Services

Store all your information securely into a simple to use and access storage solution catered to your need. We work with several storage vendors  that cater to your budget and needs providing home or office to enterprise sized solutions.
The concern stone of every security camera solution is the software that allows you to view and manage your videos. An appropriate Video Management Solution (VMS) will be selected based on your required needs
Analyze your video on a new level through video analytical software allowing you to get results out in the fraction of the time it would take you when traversing video files manually.