BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//SUMURI - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://sumuri.com
X-WR-CALDESC:Events for SUMURI
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250113
DTEND;VALUE=DATE:20250118
DTSTAMP:20260410T121555
CREATED:20241122T151550Z
LAST-MODIFIED:20250828T143812Z
UID:253128-1736726400-1737158399@sumuri.com
SUMMARY:MFSC-101: Online\, Hong Kong
DESCRIPTION:Best Practices in Mac Forensics will be presented by SUMURI from January 13 – 17\, 2025\, 8:00 AM to 5:00 PM HKT. \nSUMURI’s Macintosh Forensic Survival Course (MFSC-101) provides vendor-neutral training that covers the process of examining a Macintosh computer from the first step to the last step in logical order. \nMFSC-101 is designed for both the beginner Mac examiner as well as the advanced. The knowledge you gain can be applied to any forensic tool on any platform. No sales pitch\, just Mac forensics! \n  \nMFSC-101 is the first of the two prerequisite courses required for the Certified Forensic Mac Examiner (CFME). Learn more about our training courses and how to become a CFME: https://sumuri.com/mac-training/ \nStart your journey to certification and elevate your expertise today! \n		\n			\n					\n		\n				\n				\n							\n\n						Note:\n			\n						Students will need access to a Mac computer running the current version of macOS for the course.\n			\n			\n		\n						\n				\n				\n					\n				\n				\n		\n		\n				\n					\n				\n				\n							\n							\n					\n												Need to Hide\n					\n					\n				\n							\n					\n												Topics to include but are not limited to:\n					\n							\n				\n					\n				\n				\n							\n							\n					\n												Overview of macOS Versions\n					\n					Identifies features of forensic importance in different macOS and when they appeared \n				\n							\n					\n												Understanding the Mac File System Technology\n					\n					A review of all file system technology supported by macOS such as APFS\, Core Storage\, Fusion Drives\, and macOS Extended \n				\n							\n					\n												Intel Mac Technology and Bootcamp\n					\n					Explains the forensic significance of Mac Intel Technology \n				\n							\n					\n												Silicon Mac Technology\n					\n					Explains the unique issues and forensic significance of M1 Silicon Technology \n				\n							\n					\n												Mac Security Issues and FileVault Attacks\n					\n					Current best practices for dealing with Mac Security \n				\n							\n					\n												Macintosh Search and Seizure\n					\n					Best practices for seizing Mac and iOS hardware \n				\n							\n					\n												Safely Obtaining System Information\n					\n					How to safely obtain system information without making changes to the evidence \n				\n							\n					\n												Open Firmware Passwords\n					\n					Explains OFP\, how to set and remove OFP if it is necessary \n				\n							\n					\n												Volatile Data Collection\n					\n					Discussion on unique issues concerning Mac Volatile Data\, methods to collect it\, and the need for a Trusted Utilities Disk \n				\n							\n					\n												Forensic Imaging\n					\n					Discussion and exercises on imaging Intel and M1 Silicon Macs to include issues present by Mac security features \n				\n							\n					\n												Imaging Mac RAM\n					\n					Discussion on the challenges in capturing RAM due to macOS security features \n				\n							\n					\n												Mounting Forensic Images in the macOS\n					\n					Safely mounting forensic images for Processing and analysis \n				\n							\n					\n												Indexing Forensic Images\n					\n					How to index forensic images using macOS \n				\n							\n					\n												Search Techniques Using macOS\n					\n					Creating custom search expressions  from the command-line and GUI \n				\n							\n					\n												Locating Evidence\n					\n					How to identify\, analyze and extract macOS and application artifacts such as Email\, Graphics\, Internet Artifacts\, Documents\, System Artifacts\, Instant Messaging\, logs\, and more \n				\n							\n					\n												Recovering Deleted Files\n					\n					An exercise in manually recovering deleted files and the dangers of Mac optimization \n				\n							\n					\n												Examining SQLite Databases and PLIST files\n					\n					Examining the heart of Mac data storage \n				\n							\n					\n												Using macOS for Forensics\n					\n					How to utilize built-in macOS technology for forensics \n				\n							\n					\n												Report Development\n					\n					How to create native reports using the Mac to view data properly \n				\n							\n					\n												Recommendations for Mac Forensics system configuration and hardware\n					\n					Our recommendations for commercial and non-commercial tools to assist with Mac forensics. \n				\n										\n					\n						\n				\n					\n				\n				\n		 \n				\n										\n					\n						\n				\n				\n				\n					Secure Your Spot – Limited Seats Available!				\n				\n					\n				\n		\n					\n				\n				\n									LIMITED TIME OFFER								\n				\n				\n				\n									Use this coupon code below to get 15% discount.								\n				\n				\n				\n									“MFSC15”
URL:https://sumuri.com/event/mfsc-101-250113hk/
CATEGORIES:Best Practices in Mac Forensics,Macintosh Forensics Training
ATTACH;FMTTYPE=image/webp:https://sumuri.com/wp-content/uploads/2024/11/ONLINE_101_landing_page.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250120
DTEND;VALUE=DATE:20250125
DTSTAMP:20260410T121555
CREATED:20241122T193502Z
LAST-MODIFIED:20241202T183102Z
UID:253171-1737331200-1737763199@sumuri.com
SUMMARY:MFSC-201: Online\, Hong Kong
DESCRIPTION:Advanced Practices in Mac Forensics will be presented by SUMURI from January 20 – 24 2025\, 8:00 AM to 5:00 PM HKT. \nAdvanced Practices in Mac Forensics (MFSC-201) builds upon the Best Practices in Mac Forensics (MFSC-101) course. MFSC-201 focuses on in-depth analysis techniques\, which provide the students the ability to apply what they have learned in real-world cases. \nParticipants will engage in teamwork-based learning\, guided by instructors dedicated to ensuring no one is left behind.  \nPre-requisite\nCompletion of MFSC-101 (or a comparable Mac Forensics course) is strongly recommended before taking MFSC-201. \n \n  \nMFSC-201 is the second of the two prerequisite courses required for the Certified Forensic Mac Examiner (CFME). Learn more about our training courses and how to become a CFME: https://sumuri.com/mac-training/ \nStart your journey to certification and elevate your expertise today! \n		\n			\n					\n		\n				\n				\n							\n\n						Note:\n			\n						Students will need access to a Mac computer running the current version of macOS for the course.\n			\n			\n		\n						\n				\n				\n					\n				\n				\n		\n		\n				\n					\n				\n				\n							\n							\n					\n												Need to Hide\n					\n					\n				\n							\n					\n												Topics to include but are not limited to:\n					\n							\n				\n					\n				\n				\n							\n							\n					\n												Advanced File System Analysis\n					\n					Introduction to the concept of domains within the macOS environment and locations of evidentiary artifacts and their contents. \n				\n							\n					\n												Advanced Command Line\n					\n					Work with macOS’ powerful and highly useful command-line interface to assist in forensic examinations of a Mac. \n				\n							\n					\n												macOS Log Analysis\n					\n					Learn how to identify artifacts from persistent and volatile logs\, including Apple Unified Logs. \n				\n							\n					\n												File System Event Monitoring and Analysis\n					\n					Work with live and logged File System Events to identify artifacts and determine file usage history on a volume or disk. \n				\n							\n					\n												Identifying and Analyzing Virtual Machines\n					\n					Identify the use of a VM within macOS and the procedures necessary to analyze artifacts. \n				\n							\n					\n												AppleScript and Automator\n					\n					Learn to develop custom programs and workflows to automate almost any task to simplify and enhance forensic examinations. \n				\n							\n					\n												macOS Server & Software RAIDs\n					\n					Discussion on macOS server technology and Apple software RAIDs. Learn the best practices on handling servers and Apple RAIDs. \n				\n							\n					\n												Macintosh Timeline Analysis\n					\n					Understand and identify unique macOS metadata timestamps for use in building a timeline of a file system that can retrace the suspect’s history minute by minute or second by second. \n				\n							\n					\n												iCloud Forensics\n					\n					Find and analyze iCloud artifacts and data\, such as documents\, synced with an Apple iCloud account. \n				\n							\n					\n												Time Machine Analysis\n					\n					Understand the Time Machine backup process and structure in order to find data. \n				\n							\n					\n												Unique Apple Technology\n					\n					Lean the best practices and resources available to deal with unique Apple technology such as Air Tags and Continuity. \n				\n							\n					\n												Advanced Search Techniques\n					\n					Use advanced search techniques\, both macOS native and 3rd party tools\, to find evidentiary artifacts within the macOS. \n				\n							\n					\n												Application Deconstruction\n					\n					Learn how to find any and all artifacts left behind by installed\, and in some cases uninstalled\, applications. \n				\n								\n						\n				\n					\n				\n				\n		 \n				\n										\n					\n						\n				\n				\n				\n					Secure Your Spot – Limited Seats Available!				\n				\n					\n				\n		\n					\n				\n				\n									LIMITED TIME OFFER								\n				\n				\n				\n									Use this coupon code below to get 15% discount.								\n				\n				\n				\n									“MFSC15”
URL:https://sumuri.com/event/mfsc-201-250120hk/
CATEGORIES:Advanced Practices in Mac Forensics,Macintosh Forensics Training
ATTACH;FMTTYPE=image/webp:https://sumuri.com/wp-content/uploads/2024/11/ONLINE_201_landing_page.webp
END:VEVENT
END:VCALENDAR