Entry - CCIO@4x
Level 1 of 4

Cellebrite Collector and Inspector Operator (CCIO)

  • Level
    Entry
  • Length
    Four-Day
    (28 Hours)
  • Delivery Mode
    In-Person
    Virtual
  • Certification
    --

Upcoming Classes

FILTER BY:
No results found. Please try again later
  • In-Person
    Oct 27-30
    Vienna, VA GMT-4
  • Virtual
    Nov 03-06
    Virtual GMT+1
  • In-Person
    Nov 25-28
    Tokyo GMT+9
  • Virtual
    Dec 08-11
    Virtual GMT-5
  • Virtual
    Feb 24-27
    Virtual GMT-5
  • Virtual
    May 05-08
    Virtual GMT-5

Course Description

CCIO (Cellebrite Collector and Inspector Operator) is a four (4) day entry level course designed to provide users with an introduction to digital forensics methodologies using Cellebrite tools, Digital Collector and Inspector. Whether the goal is to learn the fundamentals for investigative techniques or gain experience with Cellebrite’s tools, the CCIO course provides a perfect opportunity. The course is taught using a full scenario based investigative tutorial to better merge the different skill levels of attendees.

NOTE: This course was formerly known as Cellebrite Computer Forensic Fundamentals (CCFF).

Course Learning Objectives

Upon successful completion of this course, students will be able to:

  • Apply the appropriate procedures for live triage and imaging in digital
  • Investigations for both MacOS and Windows OS.
  • Experiment with the features and functions of Digital Collector for various investigative purposes.
  • Defend the value of booting and using Digital Collector for the purposes of data collection to ensure the security of the collected data.
  • Select the relevant settings for various file systems on both MacOS and Windows OS for various scenarios.
  • Collect forensic data from various devices using Inspector, ensuring best practices for digital forensic case management.
  • Generate an ethically and legally sound digital forensics report for various investigative purposes.
  • Perform ethically and legally sound data extractions verifying hash sets and using third party validation techniques to promote the integrity of the data in the investigation.
  • Participate in the digital investigative process through exploring file carving, email evidence, and internet artifacts for MacOS and Windows OS and explain the significance of these artifacts regarding the digital forensic process.

 

DOWNLOAD COURSE OVERVIEW →

REGISTER NOW →