BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//SUMURI - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://sumuri.com
X-WR-CALDESC:Events for SUMURI
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20270314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20271107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260831
DTEND;VALUE=DATE:20260905
DTSTAMP:20260405T155745
CREATED:20260223T161945Z
LAST-MODIFIED:20260223T162423Z
UID:285235-1788134400-1788566399@sumuri.com
SUMMARY:MFSC-201: Online\, Eastern Daylight Time
DESCRIPTION:Advanced Practices in Mac Forensics will be presented by SUMURI from August 31 – September 4\, 2026\, 8:00 AM to 5:00 PM EDT. \nAdvanced Practices in Mac Forensics (MFSC-201) builds upon the Best Practices in Mac Forensics (MFSC-101) course. MFSC-201 focuses on in-depth analysis techniques\, which provide the students the ability to apply what they have learned in real-world cases. \nParticipants will engage in teamwork-based learning\, guided by instructors dedicated to ensuring no one is left behind.  \nPre-requisite\nCompletion of MFSC-101 (or a comparable Mac Forensics course) is strongly recommended before taking MFSC-201. \n \n  \nMFSC-201 is the second of the two prerequisite courses required for the Certified Forensic Mac Examiner (CFME). Learn more about our training courses and how to become a CFME: https://sumuri.com/mac-training/ \nStart your journey to certification and elevate your expertise today! \n		\n			\n					\n		\n				\n				\n							\n\n						Note:\n			\n						Students will need access to a Mac computer running the current version of macOS for the course.\n			\n			\n		\n						\n				\n				\n					\n				\n				\n		\n		\n				\n					\n				\n				\n							\n						\n				\n					 Item #2 \n									\n				\n					\n					\n				\n					\n						\n				\n					 Topics to include but are not limited to: \n									\n				\n				\n				\n									\n				\n					\n				\n				\n									\n				\n				\n				\n							\n							\n					\n												Advanced macOS Artifact Analysis\n					\n					Deep dive into property lists\, SQLite databases\, bundle files\, and library directories to uncover key forensic evidence. \n				\n							\n					\n												Advanced macOS Artifact Analysis:\n					\n					Deep dive into property lists\, SQLite databases\, bundle files\, and library directories to uncover key forensic evidence. \n				\n							\n					\n												User and System Activity Reconstruction:\n					\n					Identify user account changes\, network connections\, attached devices\, and hibernation states to build detailed timelines. \n				\n							\n					\n												Mastering macOS Timestamps:\n					\n					Learn how to interpret POSIX and Apple Extended Attribute timestamps to track file and system events accurately. \n				\n							\n					\n												Comprehensive Log Analysis:\n					\n					Extract and interpret data from unified logs\, domain-specific logs\, and application logs to reveal user actions and system events. \n				\n							\n					\n												Application Deconstruction:\n					\n					Perform static and dynamic artifact analysis of first- and third-party applications to uncover hidden or unsupported evidence. \n				\n							\n					\n												Advanced Command Line for Forensics:\n					\n					Utilize macOS terminal commands to locate\, extract\, and analyze artifacts quickly and efficiently. \n				\n							\n					\n												Time Machine and FSEvents Forensics:\n					\n					Recover historical snapshots\, identify file changes\, and track system activity over time. \n				\n							\n					\n												RAM\, Virtual Machine\, and iOS Artifact Analysis:\n					\n					Examine volatile memory\, virtual machine images\, and iOS data stored on Macs. \n				\n							\n					\n												Custom Forensic Tool Development:\n					\n					Learn to script your own acquisition\, triage\, and data collection tools in Bash and Python. \n				\n							\n					\n												macOS Automation for Investigations:\n					\n					Leverage AppleScript and Automator to streamline repetitive forensic tasks. \n				\n										\n					\n						\n				\n					\n				\n				\n		\n						\n				\n				\n					\n					\n					\n							\n				\n				\n				\n					Secure Your Spot – Limited Seats Available!
URL:https://sumuri.com/event/mfsc-201-260831on/
CATEGORIES:Advanced Practices in Mac Forensics,Macintosh Forensics Training
ATTACH;FMTTYPE=image/webp:https://sumuri.com/wp-content/uploads/2024/11/MFSC-201-Online-Eastern.webp
END:VEVENT
END:VCALENDAR