Oxygen Forensics Launches Online Certification Course June 1

Oxygen Forensics, a worldwide developer and provider of advanced forensic data examination tools for mobile devices and cloud services, today announced that beginning June 1, forensic experts will be able to take the Oxygen Forensic Expert Certification 3-day training course online.

Oxygen Forensics is launching its own online portal aimed at providing a higher level of service to customers and users called the Learning Management System (LMS). Oxygen’s LMS will host the training course as well as other online materials.

The Oxygen Forensic Expert Certification course introduces advanced methods of smart device collections and data analysis. Students will examine, collect and analyze data from iOS, Android, and Windows devices, and then work to obtain physical images, understand file system formats, storage methods and evidence locations. The course also provides training and instruction on cloud storage and extraction techniques, with participants receiving a start to finish education on the use of Oxygen Forensic® Detective.“Our customers need and want training, but sometimes they cannot afford to take time off from their jobs to travel out of town and take our 3-day course,” said Lee Reiber, Oxygen Forensics COO. “Having our premiere Forensic Expert Certification course available via our Learning Management System will enable our customers and users to access this certification class from the comfort of their office or home and they can complete their required work in the timing that works best for them.”

As the course evolves, Oxygen will continually add more content and updates to keep up with new product additions that are released every two weeks. Once students successfully pass the certification examination, they can re-certify every two years within Oxygen’s LMS. This re-certification will be on new features as well as existing features, so it is important to stay up to date on the release notes.

Get The Latest DFIR News!

Top DFIR articles in your inbox every month.


Unsubscribe any time. We respect your privacy - read our privacy policy.

The certification examination is included with a purchase of the course, and Oxygen Forensics is offering a $1,000 discount for the online certification course for those that purchase a license for Oxygen Forensic Detective through July 1, 2017. To sign up for the Oxygen Forensic Expert Certification training course, please click here.
For those that still want to attend the off-site 3-day certification course, those will continue to be offered by Oxygen Forensics.

About Oxygen Forensics, Inc.
Founded in 2000, Oxygen Forensics is the worldwide leading maker of the advanced forensic data examination tools for smartphones and other mobile devices. The company is dedicated to delivering the universal forensic solution covering the widest range of mobile devices running Android, iOS, Blackberry, Windows Phone, Symbian and other operating systems. Law enforcement and government agencies, institutions, corporations and private investigators, help desk personnel and thousands of private consumers rely on Oxygen Forensics products to ensure evidence availability in the event of mobile device data analysis and recovery.
For more information about Oxygen Forensics, please visit the website.

Leave a Comment

Latest Videos

Quantifying Data Volatility for IoT Forensics With Examples From Contiki OS

Forensic Focus 22nd June 2022 5:00 am

File timestamps are used by forensics practitioners as a fundamental artifact. For example, the creation of user files can show traces of user activity, while system files, like configuration and log files, typically reveal when a program was run. 

Despite timestamps being ubiquitous, the understanding of their exact meaning is mostly overlooked in favor of fully-automated, correlation-based approaches. Existing work for practitioners aims at understanding Windows and is not directly applicable to Unix-like systems. 

In this paper, we review how each layer of the software stack (kernel, file system, libraries, application) influences MACB timestamps on Unix systems such as Linux, OpenBSD, FreeBSD and macOS.

We examine how POSIX specifies the timestamp behavior and propose a framework for automatically profiling OS kernels, user mode libraries and applications, including compliance checks against POSIX.

Our implementation covers four different operating systems, the GIO and Qt library, as well as several user mode applications and is released as open-source.

Based on 187 compliance tests and automated profiling covering common file operations, we found multiple unexpected and non-compliant behaviors, both on common operations and in edge cases.

Furthermore, we provide tables summarizing timestamp behavior aimed to be used by practitioners as a quick-reference.

Learn more: https://dfrws.org/presentation/a-systematic-approach-to-understanding-macb-timestamps-on-unixlike-systems/

File timestamps are used by forensics practitioners as a fundamental artifact. For example, the creation of user files can show traces of user activity, while system files, like configuration and log files, typically reveal when a program was run.

Despite timestamps being ubiquitous, the understanding of their exact meaning is mostly overlooked in favor of fully-automated, correlation-based approaches. Existing work for practitioners aims at understanding Windows and is not directly applicable to Unix-like systems.

In this paper, we review how each layer of the software stack (kernel, file system, libraries, application) influences MACB timestamps on Unix systems such as Linux, OpenBSD, FreeBSD and macOS.

We examine how POSIX specifies the timestamp behavior and propose a framework for automatically profiling OS kernels, user mode libraries and applications, including compliance checks against POSIX.

Our implementation covers four different operating systems, the GIO and Qt library, as well as several user mode applications and is released as open-source.

Based on 187 compliance tests and automated profiling covering common file operations, we found multiple unexpected and non-compliant behaviors, both on common operations and in edge cases.

Furthermore, we provide tables summarizing timestamp behavior aimed to be used by practitioners as a quick-reference.

Learn more: https://dfrws.org/presentation/a-systematic-approach-to-understanding-macb-timestamps-on-unixlike-systems/

YouTube Video UCQajlJPesqmyWJDN52AZI4Q_i0zd7HtluzY

A Systematic Approach to Understanding MACB Timestamps on Unixlike Systems

Forensic Focus 21st June 2022 5:00 am

This error message is only visible to WordPress admins

Important: No API Key Entered.

Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.

Latest Articles

Share to...