Conception of a Master Course for IT and Media Forensics Part II: Android Forensics

Size: px
Start display at page:

Download "Conception of a Master Course for IT and Media Forensics Part II: Android Forensics"

Transcription

1 Conception of a Master Course for IT and Media Forensics Part II: Android Forensics Knut Bellin Brandenburg University of Applied Sciences Department of Informatics and Media Magdeburger Straße 50, D Brandenburg, Germany bellin@fh-brandenburg.de Reiner Creutzburg Brandenburg University of Applied Sciences Department of Informatics and Media Magdeburger Straße 50, D Brandenburg, Germany creutzburg@fh-brandenburg.de Abstract The growth of Android in the mobile sector and the interest to investigate these devices from a forensic point of view has rapidly increased. Many companies have security problems with mobile devices in their own IT infrastructure. To respond to these incidents, it is important to have professional trained staff. Furthermore, it is necessary to further train their existing employees in the practical applications of mobile forensics owing to the fact that a lot of companies are trusted with very sensitive data. Inspired by these facts, this paper addresses training approaches and practical exercises to investigate Android mobile devices. Keywords- mobile forensics, mobile forensic training, mobile forensic education, Android forensics, small scale digital device forensics I. INTRODUCTION The technique of computer forensics is used for the purposes of investigation into single computers, networks and mobile devices; there are two main methods for such investigations - Post Mortem and Live analysis. The post-mortem analysis is used for investigations after a computer is switched off, however should the computer still be switched on, a live analysis may be performed. In the field of forensic examination of mobile devices, an accurate distinction of post-mortem and live analysis is not always easily possible as most mobile phone manufacturers use in-house developed hardware and many different operating systems. The most common platforms in the mobile phone world are Windows Mobile, Apple ios and Google Android and from a forensic point of view, it is very difficult to use a unified analysis method, especially in the creation of a forensic disk image, owing to the many different platforms that are currently used e.g. Android and it is currently not possible to create an image without changing the output medium. The forensic analysis of network traffic can often only be performed in a live system and ideally, the attacker is still in the system and information can be collected in real time. II. WORKPLACE, SOFTWARE AND HARDWARE The Brandenburg University of Applied Sciences established a well-equipped forensics lab, opened in 2010, for the purposes of mobile traineeships in which a huge range of hardware and software can be used: Oxygen Forensic Suite 2013, Belkasoft, viaextract, EnCase Smartphone Examiner and wide selection of freeware tools. All forensic tasks are matched to these programs, including specific tasks which can be realized with the functions of the programs; the exercises containing specific questions aimed at a comparison of the presented software. The hardware facilities include 10 quad-core Workstations, many varieties of Android devices (Figure 1), at least 20 test drives, additional smartphones and tablets such as iphone 5, ipads and write blockers are available and used regularly for forensic practice.

2 Figure 1. Android devices III. EXERCISE The Android forensics traineeship includes more than 6 selected exercises which address the forensic examination of mobile phones. The exercises include the correct connecting and read-out of an Android phone, the detailed study of individual types of Android phones and a special viewing of forensically interesting differences - such as the analysis of rooted and nonrooted Android Phones [8]. In the University s forensics laboratory traineeships and further training in the fields of computer and small scale digital device forensics, media, networking, mobile, CD, DVD and live forensics are carried out. Contained within the presented training concept, more than 20 exercises have been created, two of those forensic exercises are briefly introduced below. All previously created exercises are summarized in Table 1. Topic TABLE I. Number of exercises LIST OF ALL PREVIOUSLY CREATED EXERCISES Content and tasks of exercises Computer forensics 10 creating a forensic disk image, integrating a forensic duplicate and search for deleted data, extracting Slack Space, analysis, Windows 7 Registry, passwordanalysis of Office files, and Windows 7 Live forensics 3 assurance of volatile information, create dumps of RAM, investigation of a RAM dump

3 Mobile forensics 6 Android forensics: analyze user data and extract, analyze and evaluate android phones by Oxygen Forensic Suite and viaextract (pictures, clients, geo-data, etc.), differences between root and unroot devices, location of interesting forensic data Network forensics 6 analysis of a Web application, SQL injection, creating a network dump, investigation of a network dump, social networks, IPFire CD and DVD forensics 1 forensic analysis of CD, DVD and Blu-ray Linux forensics 5 Autopsy as a forensic browser, creating a forensic disk image, integrating a forensic duplicate and search for deleted data, extracting Slack Space Android Forensics Exercise 1 Detailed forensic analysis of a android mobile phone After connecting to a device and collecting the data, which are of forensic importance, a detailed analysis of the obtained data is performed. For the purpose of the exercise, the following scenario is outlined: Several android mobile phones were secured and in order to prevent data loss, e.g. by a depleted battery, it its imperative that the devices be seized and the data stored directly in Oxygen as an image. At a later point these stored images may be analyzed by the investigators in the forensics laboratory for suspicious information. Tasks Create your own project folder and name it according to your family name and your case Start the forensic tool and add a forensic image. Use the forensic software Oxygen Forensic Suite If possible use your own Android smartphone for the extraction of the data. Use forensic provided by Oxygen Forensic that can be found on there website: ( Perform an analysis of the forensic image with the help of Oxygen Forensic Suite Carefully document your analysis and add screenshots. Demonstrate your results to other groups and compare it with your own. Save all the forensically relevant results, screenshots documents and protocols in your project folder. Read the whole task carefully, follow all hints of the instructor and answer all asked questions as detailed as possible. Important Information Make sure that not every group is studying the same forensic image. Exchange ideas with the other groups and distribute the forensic images evenly. For the use of the forensic tool Oxygen Forensic Suite 2013 a USB dongle is needed. Evaluation Which forensic image did you use and why? What data structure will appear after adding the forensic image (is it a system files or is the file system visible)? Carefully document your investigation results using screenshots, i.e. - What information did you find, where did you find it and why in your opinion are these data forensically interesting (use a PC for your documentation). From which two other exercise groups did you get a presentation of results and which forensic image was used? Which image provided the most valuable information that could be extracted and why? Questions and suggestions for improving this exercise: Android Forensics Exercise 2 Differences between rooted and unrooted devices For the examination of an Android smartphone is it very important that the investigators have good knowledge about the Android platform and functions. A forensic investigation focuses on the data recorded, the extraction, the analysis and understanding of these data. It is important to understand how and where the data is stored and what types of data are available. These factors are important to restore and analyze data. Android saves a lot of data that consist of user and system information.

4 The following exercise will give an understanding of the development of Android and shows methods to analyse the data structures. Task Use the tool "adb" from the Android SDK and the software Oxygen Forensic Suite Use if possible your own Android smartphone for the extraction of application data. For the data analyses use the provided Oxygen Forensic Suite Backup "Jeff's Payge Motorola Milestone (354,635,030,161,892). Ofb". Read the complete task, pay attention to the instructions and answer all the questions in as detailed a manner as possible. Turn on the "USB debugging" - function. This is located in Settings under Applications -> Development. Connect your phone via USB to the PC. If the Device Manager in Windows shows an unknown device named "Android" or similar, please install the appropriate driver for the Smartphone. Start the adb - tool from the Android SDK and view all connected Android Devices. Establish a connection to your device. Check your access rights. Try to navigate to the /data/data/com.android.browser folder. Extract the entire contents of the folder. Analyze the extracted SQLite database files and search for interesting forensic information Use the SQLite Database Viewer (Oxygen Forensic Suite 2013). To answer the questions use the provided Oxygen Forensic Image "Jeff Payge's Motorola Milestone (354,635,030,161,892). Ofb". Important Information For all Android devices of the laboratory exist a Google account that can be used. ****@gmail.com Password: **** The forensic tool Oxygen Forensic Suite 2013 requires a USB dongle. Alternatively, use the Oxygen Forensic Suite demo. Accompanying theory For basic theoretical information see [11]. For storing user data, mainly two storage locations are used (external and internal memory), and the external memory is often an SD card or a virtualized SD card. Users or applications can save any data and create any folder structure on the external memory device, there are no special permissions required. The folder structure of the main directory is similar to many other Linux-based systems. Figure 2 shows the structure of the root directory of Android

5 Figure 2. The structure of the root directory of Android If a new application is installed the Android API creates a new folder /Data/Data/. The folder name is derived from the package name of the installed application - For example, if the default Android browser was installed; a folder with the name Com.Android.Browser is created. All data of the application are stored within this folder and in each program folder are some subdirectories that are created automatically by Android or by the developer (see table 2). Name shared_prefs lib files cache databases TABLE II. SUBDIRECTORIES THAT ARE CREATED AUTOMATICALLY BY ANDROID Function saves global settings in the XML format contains libraries needed to run the application files provided by the developer for the internal memory cached files of the application, often including browser cache or cached files of an application that use the WebKit engine SQLite databases of applications Part of the safety concept of Android involves that by default, the data in /data /data/<package name>/subfolder is only read by the application itself. Either the other programs do not have access to the folder or the developer has defined additional access rights. Without root access, it is also not possible for the forensic investigator to read out the content of the application folder and typically, the user has no root rights in most Android devices. Should an investigator require root access to the device, they must find the right method for every different model. There are many methods to achieve this goal. A practical method is to overwrite the original recovery image with an alternative one to get access to the whole file system.

6 For the forensic investigator to gain root access, it is important to know what kind of files are of interest in the Android system. Android saves a lot of data in SQLite databases and these files are very important from a forensic point of view as SQLite databases are a good source of forensically interesting data, if an Android App creates a SQLite database it is stored in the /data/data/<package name>/databases folder. In 5 different folders many different database files of the browser can be found: app_icons: 1 database with websites icons app_cache: 1 database with internet-cache data app_geolocation: 2 databases with GPS positions and access rights app_databases: 21 databases to store webpages locally databases: 3 databases with data from the browser cache To analyze a SQLite database there are a lot of viewer applications, for example the SQLite Viewer from the cell phone forensics software Oxygen Forensic Suite ADB The command-line application adb (Android debug bridge) is a part of the Android SDK and it is a very useful tool for a forensic investigation. With the adb tool it is possible to install/uninstall apps, evaluate logfiles, transmit debug information, transfer files and run a command line on the device, however in order to run the adb tool on the Android device the "usbdebugging" option must be enabled [10]. Useful adb commands are: adb devices: listing of all connected android smartphones adb push or adb pull: transfer of files between PC and smartphone adb shell: execution of a command line on the android smartphone adb install <path_to_apk>: installing an application adb logcat: output of logging information adb kill-server: exit of the pc-daemon For more information about adb tool see Another useful tool of the Android SDK is the "Dalvik debug monitor". With this tool much of the system information can be reviewed and analyzed from the device. The tool allows the examiner to: list the processes output of logging information indicate memory usage / CPU usage display of used threads and processes perform screenshots view the file explorer The tool is located in the "tools" subfolder of the Android SDK. The figure 3 shows the usage of the Dalvik debug monitor [11].

7 Figure 3. Dalvik debug monitor [11] Evaluation Which smartphone do you use and which version of Android is installed? Do you have access to the directory data/data/com.android.browser and could you extract the data to your PC? If not, why not? In total, how many databases are on the device and how many in particular did you find in the application folder of the default Internet browser? Identify and name the database files that are stored in the folder of the Internet browser. What forensically interesting data are included in the databases? Name at least 6 database files and 8 forensically interesting information items. How does the structure of deleted rows of data look like in SQLite databases? Which websites should record the location of the device? Name the five most visited websites of the browsers.db and the number of their views. What information can be extracted from the webview.db? What information is especially interesting? IV. USABILITY The following chapter demonstrates that the exercises can be implemented and are practically feasible. For this purpose, they have been included in the Master Course on IT and Media Forensics at the Brandenburg University of Applied Sciences, Germany. For detailed information please see the part I of this series of papers. Procedure of the usability test The Android forensics exercises were evaluated as a part of the whole forensics training lesson. For the test phase 18 exercises were used and 20 students of the Master of Science study program performed the tasks. For the evaluation of the

8 tasks, a single evaluation form was used. This questionnaire contained eight questions had to be answered by each participant who performed the exercises. The questionnaire contained the following questions: Did the exercises help you to better understand the complex topic of IT forensics? How do you evaluate the workload and time expenses of the exercises? How did you like the practical part of the exercises? How difficult did, you find the exercises. How difficult did, you find the tasks of the exercises. How complex (in your opinion) were the questions? Was the accompanying theory sufficient? How big was the learning experience through the practical exercises according to the topic? Results The results of the form and the additional questions and suggestions that were handed over to the instructor during the exercises displayed the main component of the evaluation. The information was evaluated and compiled by the instructor. The results of the analysis and evaluation of the Android exercises are summarized in table 3.. TABLE III. THE RESULTS OF THE ANALYSIS AND EVALUATION OF THE QUESTIONNAIRES 1.) Did the exercises help you to better understand the complex topic of Android forensics? Answer very good 6 good 14 sufficient 0 no 0 2.) How do you evaluate the workload and time expenses of the exercises? Answer appropriate 16 too high 4 too low 0 not available 0 3.) How did you like the practical part of the exercises? Answer very much 0 exactly right 18 superfluous 2 not available 0 4.) How difficult did you find the exercises? Answer too difficult 4 exactly right 15 superfluous 1 not available 0

9 5.) How difficult did you find the tasks of the exercises? Answer too complex 1 exactly right 15 superfluous 4 not available 0 6.) How complex (in your opinion) were the questions? Answer very high 4 high 14 appropriate 2 too high 0 7.) Was the accompanying theory enough? Answer yes 13 no 2 too few 3 too much 2 8.) How big was the learning experience through the practical exercises according to the topic? Answer very high 2 high 17 low 1 very low 0 Suggestions for improvement The participants - as well as the instructor - learned how to improve the exercises. The main areas found in need of improvement were: Deficiencies found in the understanding of the tasks, caused by an ambiguous expression. A solution is suggested into that it may be useful to give some instructions for greater clarification in the extent and precision of the answers. Also the very different hardware of the Android devices was found to be a problem. For many students it was very difficult to connect the Android devices to the computer or the forensic software as the correct driver for the device was often not automatically found by the operating system. Drivers often had to be installed manually. V. CONCLUSION Android forensics plays nowadays an important role in the wide field of IT forensics. In order to analyze all forensically interesting data of an Android smartphone, it is necessary to revise the standardized forensic procedures, as both the hardware and software of Android phones are often very complex and difficult to understand. Within an investigation and in the implementation of the exercises, it is also important to know the exact type of the device, because the missing Android drivers are causing the most problems and errors in the investigation. For that reason the preparation costs are high, however the learning curve is also very high. Investigators can greatly enhance their knowledge and can cover a wide range of smartphone forensics.

10 The theme "Creating courses in the field of IT forensics" offers many possibilities. Already, the request is steadily increasing for qualified and well-trained IT forensic professionals. And it can be forecasted that - especially in Germany - this trend will continue over the next few years. Additionally, the very rapid development in the area of IT and mobile devices makes it continuously necessary for a forensic researcher to constantly enlarge upon specific topics and to learn new techniques. For detailed information please see the part I of this series of papers. REFERENCES [1] Overill, R.: Development of masters modules in computer forensics and cybercrime for computer science and forensic science students. In: Electronic Security Forensics Vol. 2, No. 2, 2009 [2] Stephens, P.: Should Training Be Part Of An Educational Computer Forensics Program? Report, Canterbury Christ Church University [3] Mink, M.; F. Beek: Wie lehrt man IT-Sicherheit am Besten? Eine empirische Studie Universität Mannheim [4] Breeuwsma, M.; M. Jongh; C. Klaver; R. Knijff; M. Roeloffs: Forensic Data Recovery from Flash Memory. In: Small Scale Digital Device Forensics Journal, Vol. 1, No. 1, June 2007 [5] Nelson, J.: Guide to Computer Forensics and Investigations. Cengage Learning Services, 2009 [6] Luttenberger, S.; K. Kröger; R. Creutzburg: Examination of mobile phones in a university forensic lab environment. In: Proc. SPIE 8063 (2011), 80630Q, DOI: / , (last access December 21, 2012), (Last access December 24, 2012) [7] Jansen, W.: Forensic Software Tools for Cell Phone - Subscriber Identity Modules. In: Technical Report CISE-CSE [8] Geschonnek, A.: Computer Forensik - Computerstraftaten erkennen, ermitteln, aufklären. 4th Edition, dpunkt-verlag, [9] Hoog, A.: Android Forensics. Syngress, [10] Android Developers, Android Developers - Tools, [Online]. Available: [ ]. (Last access December 21, 2012)

and Security Testing Shawn Valle gmail. com May 2013

and Security Testing Shawn Valle gmail. com May 2013 and Security Testing Shawn Valle shawnvalle @ gmail. com May 2013 Introductions 16 years in IT and security (CISSP, MCP, LCP) Co-established FFRDC s Mobile Security Practice in 2010, leading engineering

More information

Android Forensics: Simplifying Cell Phone Examinations

Android Forensics: Simplifying Cell Phone Examinations Android Forensics: Simplifying Cell Phone Examinations Jeff Lessard, Gary Kessler 2010 Presented By: Manaf Bin Yahya Outlines Introduction Mobile Forensics Physical analysis Logical analysis CelleBrite

More information

Install ADB on Windows

Install ADB on Windows Android Debug Bridge or better known as ADB is a powerful and versatile tool that lets you do a lot of things like pulling out logs, installing and uninstalling apps, transferring files, rooting and flashing

More information

OXYGEN SOFTWARE OXYGEN FORENSIC KIT

OXYGEN SOFTWARE OXYGEN FORENSIC KIT OXYGEN SOFTWARE OXYGEN FORENSIC KIT Oxygen Forensic Kit complete out-of-the-box solution When to start? Immediately! Oxygen Forensic Kit is a complete set you can quickly use right out of the box. It does

More information

IJRDTM Kailash ISBN No Vol.17 Issue

IJRDTM Kailash ISBN No Vol.17 Issue ABSTRACT ANDROID OPERATING SYSTEM : A CASE STUDY by Pankaj Research Associate, GGSIP University Android is a software stack for mobile devices that includes an operating system, middleware and key applications.

More information

Mobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014

Mobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014 Mobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014 INTRODUCTION The field of computer forensics has long been centered on traditional media like hard drives.

More information

FORENSIC ANALYSIS OF WECHAT

FORENSIC ANALYSIS OF WECHAT FORENSIC ANALYSIS OF WECHAT ON ANDROID SMARTPHONES Songyang Wu, Yong Zhang, Xupeng Wang, Xiong Xiong*, Lin Du Presented: Negamiye Arlene 2017 Nov 6th Content Introduction Related Works WeChat Forensics

More information

OXYGEN SOFTWARE OXYGEN FORENSIC KIT

OXYGEN SOFTWARE OXYGEN FORENSIC KIT OXYGEN SOFTWARE OXYGEN FORENSIC KIT Oxygen Forensic Kit complete out-of-the-box solution When to start? Immediately! Oxygen Forensic Kit is a complete set you can quickly use right out of the box. It does

More information

TestOut PC Pro - English 6.0.x COURSE OUTLINE. Modified

TestOut PC Pro - English 6.0.x COURSE OUTLINE. Modified TestOut PC Pro - English 6.0.x COURSE OUTLINE Modified 2019-01-02 TestOut PC Pro Outline - English 6.0.x Videos: 142 (17:10:32) Demonstrations: 144 (17:38:44) Simulations: 117 Fact Sheets: 189 Exams: 132

More information

Android Forensics. Investigation, Analysis, Google Android. and Mobile Security for. Andrew Hoog. John McCash, Technical Editor SYNGRESS

Android Forensics. Investigation, Analysis, Google Android. and Mobile Security for. Andrew Hoog. John McCash, Technical Editor SYNGRESS Android Forensics Investigation, Analysis, and Mobile Security for Google Android Andrew Hoog John McCash, Technical Editor AMSTERDAM BOSTON. HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO.

More information

Android Forensics. Presented By: Mohamed Khaled. Thanks to: Ibrahim Mosaad Mohamed Shawky

Android Forensics. Presented By: Mohamed Khaled. Thanks to: Ibrahim Mosaad Mohamed Shawky Android Forensics Presented By: Mohamed Khaled Thanks to: Ibrahim Mosaad Mohamed Shawky Agenda Mobile Forensic Process Different Mobile Forensic Scenario Acquisition Guide Challenges of Android Forensics

More information

Installing and configuring an Android device emulator. EntwicklerCamp 2012

Installing and configuring an Android device emulator. EntwicklerCamp 2012 Installing and configuring an Android device emulator EntwicklerCamp 2012 Page 1 of 29 Table of Contents Lab objectives...3 Time estimate...3 Prerequisites...3 Getting started...3 Setting up the device

More information

CompTIA A+ Accelerated course for & exams

CompTIA A+ Accelerated course for & exams CompTIA A+ Accelerated course for 220-901 & 220-902 exams Course overview Target Audience This course is for Participants wishing to take and pass both CompTIA A+ exams (220-901 and 220-902) exam. It is

More information

Lab 4 In class Hands-on Android Debugging Tutorial

Lab 4 In class Hands-on Android Debugging Tutorial Lab 4 In class Hands-on Android Debugging Tutorial Submit lab 4 as PDF with your feedback and list each major step in this tutorial with screen shots documenting your work, i.e., document each listed step.

More information

OXYGEN SOFTWARE OXYGEN FORENSIC KIT

OXYGEN SOFTWARE OXYGEN FORENSIC KIT OXYGEN SOFTWARE OXYGEN FORENSIC KIT Oxygen Forensic Kit complete out-of-the-box solution When to start? Immediately! Oxygen Forensic Kit is a complete set you can quickly use right out of the box. It does

More information

Android Forensics: Investigation, Analysis And Mobile Security For Google Android PDF

Android Forensics: Investigation, Analysis And Mobile Security For Google Android PDF Android Forensics: Investigation, Analysis And Mobile Security For Google Android PDF Android Forensics: Investigation, Analysis, and Mobile Security for Google Android examines the Android mobile platform

More information

Porting mobile web application engine to the Android platform

Porting mobile web application engine to the Android platform 2010 10th IEEE International Conference on Computer and Information Technology (CIT 2010) Porting mobile web application engine to the Android platform Yonghong Wu, Jianchao Luo, Lei Luo School of Computer

More information

Paraben s Photo Backup Stick V2.1. User Manual

Paraben s Photo Backup Stick V2.1. User Manual Paraben s Photo Backup Stick V2.1 User Manual About Paraben s Photo Backup Stick The Photo Backup Stick is an easy-to-use picture and video backup tool for Windows computers, Apple iphones and ipads, and

More information

2793 : Implementing and Maintaining Microsoft SQL Server 2005 Reporting Services

2793 : Implementing and Maintaining Microsoft SQL Server 2005 Reporting Services 2793 : Implementing and Maintaining Microsoft SQL Server 2005 Reporting Services Introduction Elements of this syllabus are subject to change. This three-day instructor-led course teaches students how

More information

Faheem, Muhammad; Le-Khac, Nhien-An; Kechadi, Tahar. Journal of Information Security, 5 :

Faheem, Muhammad; Le-Khac, Nhien-An; Kechadi, Tahar. Journal of Information Security, 5 : Provided by the author(s) and University College Dublin Library in accordance with publisher policies. Please cite the published version when available. Title Smartphone Forensic Analysis: A Case Study

More information

Training for the cyber professionals of tomorrow

Training for the cyber professionals of tomorrow Hands-On Labs Training for the cyber professionals of tomorrow CYBRScore is a demonstrated leader in professional cyber security training. Our unique training approach utilizes immersive hands-on lab environments

More information

Forensic Analysis of Smartphones: The Android Data Extractor Lite (ADEL)

Forensic Analysis of Smartphones: The Android Data Extractor Lite (ADEL) Annual ADFSL Conference on Digital Forensics, Security and Law 2011 May 27th, 10:45 AM Forensic Analysis of Smartphones: The Android Data Extractor Lite (ADEL) Felix Freiling University of Erlangen-Nuremberg,

More information

Macintosh Forensic Survival Course

Macintosh Forensic Survival Course Macintosh Forensic Survival Course Duration: 5 days/level Date: On demand Venue: On demand Language: English Seat availability: On demand (recommended no more than 12) Learning Objectives: Macintosh Forensic

More information

Belkasoft Evidence Center 2018 ESSENTIALS TRAINING PROGRAM

Belkasoft Evidence Center 2018 ESSENTIALS TRAINING PROGRAM Belkasoft Evidence Center 2018 ESSENTIALS TRAINING PROGRAM INTRODUCTION Belkasoft Essentials is intended for investigators of any level of expertise who want to acquire hands-on skills in computer, mobile

More information

Android App Development. Muhammad Sharjeel COMSATS Institute of Information Technology, Lahore

Android App Development. Muhammad Sharjeel COMSATS Institute of Information Technology, Lahore Android App Development Muhammad Sharjeel COMSATS Institute of Information Technology, Lahore Mobile devices (e.g., smartphone, tablet PCs, etc.) are increasingly becoming an essential part of human life

More information

BUILDING A TEST ENVIRONMENT FOR ANDROID ANTI-MALWARE TESTS Hendrik Pilz AV-TEST GmbH, Klewitzstr. 7, Magdeburg, Germany

BUILDING A TEST ENVIRONMENT FOR ANDROID ANTI-MALWARE TESTS Hendrik Pilz AV-TEST GmbH, Klewitzstr. 7, Magdeburg, Germany BUILDING A TEST ENVIRONMENT FOR ANDROID ANTI-MALWARE TESTS Hendrik Pilz AV-TEST GmbH, Klewitzstr. 7, 39112 Magdeburg, Germany Email hpilz@av-test.de ABSTRACT The growth of the Smartphone market over the

More information

Unit A: Computer and Internet Basics

Unit A: Computer and Internet Basics Unit A: Computer and Internet Basics TRUE/FALSE 1. Cars and appliances include digital electronics. ANS: T PTS: 1 REF: Concepts 2 2. Usually when people talk about computers, they are talking about a PC.

More information

Forensic Examination On Windows And Android Devices To Acquire Skype Artefacts

Forensic Examination On Windows And Android Devices To Acquire Skype Artefacts Forensic Examination On Windows And Android Devices To Acquire Skype Artefacts Anjana.R M.Tech in Computer Science with Specialization in Cyber Forensics and Information Security ER&DCIIT, Trivandrum,

More information

How to Demonstrate Junos Pulse L3 VPN - Android

How to Demonstrate Junos Pulse L3 VPN - Android How to Demonstrate Junos Pulse L3 VPN - Android 1 Setup and Demonstration 1.1 Demonstrating Junos Pulse L3 VPN on Android 4 Setup and Demonstration How to Demonstrate Junos Pulse L3 VPN - Android - 3 Juniper

More information

ATC Android Application Development

ATC Android Application Development ATC Android Application Development 1. Android Framework and Android Studio b. Android Platform Architecture i. Linux Kernel ii. Hardware Abstraction Layer(HAL) iii. Android runtime iv. Native C/C++ Libraries

More information

Implementing and Maintaining Microsoft SQL Server 2008 Integration Services

Implementing and Maintaining Microsoft SQL Server 2008 Integration Services Implementing and Maintaining Microsoft SQL Server 2008 Integration Services Course 6235A: Three days; Instructor-Led Introduction This three-day instructor-led course teaches students how to implement

More information

MaintMaster Technical White Paper

MaintMaster Technical White Paper MaintMaster Technical White Paper Welcome to MaintMaster! MaintMaster is a leading tool for return on operational reliability for discrete manufacturing. This White Paper covers most of the technical aspects

More information

Why Android? Why Android? Android Overview. Why Mobile App Development? 20-Nov-18

Why Android? Why Android? Android Overview. Why Mobile App Development? 20-Nov-18 Why Android? Android Overview Dr. Siddharth Kaza Dr. Josh Dehlinger A lot of students have them 2010 survey by University of CO 1 : 22% of college students have Android phone (26% Blackberry, 40% iphone)

More information

Planning and Administering SharePoint 2016

Planning and Administering SharePoint 2016 Planning and Administering SharePoint 2016 Course 20339A 5 Days Instructor-led, Hands on Course Information This five-day course will combine the Planning and Administering SharePoint 2016 class with the

More information

Android Security Research: Crypto Wallet Local Storage Attack

Android Security Research: Crypto Wallet Local Storage Attack Android Security Research: Crypto Wallet Local Storage Attack Author: Loc Phan Van, Viet Nguyen Quoc 22 Feb 2019 1. Background During our mobile security pen testing, we have found a very interesting attack

More information

Accessing the CAES Office of Communication File Sharing Services

Accessing the CAES Office of Communication File Sharing Services Accessing the CAES Office of Communication File Sharing Services OIT Using CrashPlan Backup Version: 7/16/2010 8:35 AM Page 0 Using Crashplan 1 About CrashPlan 1. CrashPlan is a local backup program and

More information

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo Vendor: CompTIA Exam Code: 220-902 Exam Name: CompTIA A+ Certification Exam (902) Version: Demo DEMO QUESTION 1 Which of the following best practices is used to fix a zero-day vulnerability on Linux? A.

More information

AccessData offers a broad array of training options.

AccessData offers a broad array of training options. Forensics Training AccessData offers a broad array of training options. Our trainers have more than two centuries of cumulative experience in their respective fields. Take Advantage of the All Access Pass

More information

Microsoft SharePoint Server 2013 Plan, Configure & Manage

Microsoft SharePoint Server 2013 Plan, Configure & Manage Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that

More information

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming

More information

Presentation Outline 10/16/2016

Presentation Outline 10/16/2016 CPET 491 (Phase II) Fall Semester-2012 Adam O Haver Project Advisor/Instructor: Professor Paul Lin CEIT Department 1 Presentation Outline Executive Summary Introduction Solution Development Software Analysis

More information

Chapter 2: Operating-System Structures

Chapter 2: Operating-System Structures Chapter 2: Operating-System Structures Chapter 2: Operating-System Structures Operating System Services User Operating System Interface System Calls Types of System Calls System Programs Operating System

More information

Tutorial on Basic Android Setup

Tutorial on Basic Android Setup Tutorial on Basic Android Setup EE368/CS232 Digital Image Processing, Spring 2015 Linux Version Introduction In this tutorial, we will learn how to set up the Android software development environment and

More information

Course Outline. Microsoft SharePoint Server 2013 for the Site Owner/Power User Course 55035: 2 days Instructor-Led

Course Outline. Microsoft SharePoint Server 2013 for the Site Owner/Power User Course 55035: 2 days Instructor-Led Microsoft SharePoint Server 2013 for the Site Owner/Power User Course 55035: 2 days Instructor-Led Introduction This two day class is designed for information workers or power users who serve as SharePoint

More information

Discovering Computers 2016

Discovering Computers 2016 Discovering Computers 2016 Tools, Apps, Devices, and the Impact of Technology Chapter 9 Operating Systems Objectives Overview Explain the purpose of an operating system Describe the start-up process and

More information

Basic Android Setup for Machine Vision Fall 2015

Basic Android Setup for Machine Vision Fall 2015 Basic Android Setup for Machine Vision 6.870 Fall 2015 Introduction Here we will learn how to set up the Android software development environment and how to implement machine vision operations on an Android

More information

Why the Change? 2 updates per year for the course. OS versions are progressing with no signs of slowing

Why the Change? 2 updates per year for the course. OS versions are progressing with no signs of slowing Why the Change? 2 updates per year for the course 1 Major and 1 Minor OS versions are progressing with no signs of slowing Phones become obsolete and need to be replaced with newer devices New methods

More information

Chapter 2: Operating-System Structures. Operating System Concepts 9 th Edition

Chapter 2: Operating-System Structures. Operating System Concepts 9 th Edition Chapter 2: Operating-System Structures Silberschatz, Galvin and Gagne 2013 Chapter 2: Operating-System Structures Operating System Services User Operating System Interface System Calls Types of System

More information

Planning and Administering SharePoint 2016

Planning and Administering SharePoint 2016 Planning and Administering SharePoint 2016 20339-1; 5 Days; Instructor-led Course Description This five-day course will provide you with the knowledge and skills to plan and administer a Microsoft SharePoint

More information

Mobile Hacking & Security. Ir. Arthur Donkers & Ralph Moonen, ITSX

Mobile Hacking & Security. Ir. Arthur Donkers & Ralph Moonen, ITSX Mobile Hacking & Security Ir. Arthur Donkers & Ralph Moonen, ITSX Introduction Who we are: Ir. Arthur Donkers Ralph Moonen ITSX 2 Agenda Mobile Threats BYOD iphone and Android hacking 3 Threats Various:

More information

What is included with the Office 365 ProPlus subscription license? Office 365 ProPlus for PC (Office 2016 ProPlus base applications)

What is included with the Office 365 ProPlus subscription license? Office 365 ProPlus for PC (Office 2016 ProPlus base applications) Frequently Asked Questions Office 365 ProPlus What is included with the Office 365 ProPlus subscription license? Office 365 ProPlus for PC (Office 2016 ProPlus base applications) Office 365 ProPlus for

More information

"Charting the Course... MOC /2: Planning, Administering & Advanced Technologies of SharePoint Course Summary

Charting the Course... MOC /2: Planning, Administering & Advanced Technologies of SharePoint Course Summary Description Course Summary This five-day course will provide you with the knowledge and skills to plan and administer a Microsoft environment. The course teaches you how to deploy, administer, and troubleshoot

More information

CompTIA A+ Certification ( ) Study Guide Table of Contents

CompTIA A+ Certification ( ) Study Guide Table of Contents CompTIA A+ Certification (220-902) Study Guide Table of Contents Course Introduction About This Course About CompTIA Certifications Module 1 / Supporting Windows 1 Module 1 / Unit 1 Windows Operating System

More information

A Review of Kids Tutor

A Review of Kids Tutor A Review of Kids Tutor Monali Kumbhare, Ashwini Rajput, Bhavna Daswani Department of CSE, Jhulelal Institute of Technology,Lonara Nagpur Prof. Priyanka Dudhe Assistant Professor, Department of CSE, Jhulelal

More information

Chapter 2. Operating-System Structures

Chapter 2. Operating-System Structures Chapter 2 Operating-System Structures 2.1 Chapter 2: Operating-System Structures Operating System Services User Operating System Interface System Calls Types of System Calls System Programs Operating System

More information

Good morning! Hardware: Input, Processing, Output, and Storage Devices

Good morning! Hardware: Input, Processing, Output, and Storage Devices Good morning! Hardware: Input, Processing, Output, and Storage Devices Computer Systems: Integrating the Power of Technology Hardware components: Central processing unit (CPU): Arithmetic/logic unit, the

More information

Microsoft Core Solutions of Microsoft SharePoint Server 2013

Microsoft Core Solutions of Microsoft SharePoint Server 2013 1800 ULEARN (853 276) www.ddls.com.au Microsoft 20331 - Core Solutions of Microsoft SharePoint Server 2013 Length 5 days Price $4290.00 (inc GST) Version B Overview This course will provide you with the

More information

DETERMINATION OF THE PERFORMANCE

DETERMINATION OF THE PERFORMANCE DETERMINATION OF THE PERFORMANCE OF ANDROID ANTI-MALWARE SCANNERS AV-TEST GmbH Klewitzstr. 7 39112 Magdeburg Germany www.av-test.org 1 CONTENT Abstract... 2 Determination of the Malware Detection Rate...

More information

GETTING STARTED Contents

GETTING STARTED Contents 2.5 Enterprise GETTING STARTED Contents Quick Start Guide... 2 Supporting Data... 3 Prompts... 3 Techniques... 4 Pragmatic Observations... 5 Locations... 6 School Levels... 6 Quick Notes... 6 Session Groups...

More information

ANDROID APPLICATION DEVELOPMENT COURSE Training Program

ANDROID APPLICATION DEVELOPMENT COURSE Training Program ANDROID APPLICATION DEVELOPMENT COURSE Training Program This Android Application Development Course is a 24 Hours Training Program with Certification. The program is to be developed for Matriculated, Intermediate

More information

IT Essentials v6.0 Windows 10 Software Labs

IT Essentials v6.0 Windows 10 Software Labs IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows

More information

Intro. This program can retrieve messages, call logs, pictures, contacts, apps, calendar events, s, passwords, deleted data, and much more.

Intro. This program can retrieve messages, call logs, pictures, contacts, apps, calendar events,  s, passwords, deleted data, and much more. FAQ Intro Thank you for purchasing MOBILedit Forensic Express. This tool preforms mobile phone content extractions and is used by professionals in law enforcement, military as well as the corporate and

More information

COLLEGE OF ENGINEERING, NASHIK-4

COLLEGE OF ENGINEERING, NASHIK-4 Pune Vidyarthi Griha s COLLEGE OF ENGINEERING, NASHIK-4 DEPARTMENT OF COMPUTER ENGINEERING 1) What is Android? Important Android Questions It is an open-sourced operating system that is used primarily

More information

Syllabus. Course Title: Cyber Forensics Course Number: CIT 435. Course Description: Prerequisite Courses: Course Overview

Syllabus. Course Title: Cyber Forensics Course Number: CIT 435. Course Description: Prerequisite Courses: Course Overview Syllabus Course Title: Cyber Course Number: CIT 435 Course Description: Introduces the principles and practices of digital forensics including digital investigations, data and file recovery methods, and

More information

COURSE OUTLINE AND SCHEDULE: ASSIGNMENTS ARE DUE EACH MONDAY WEDNESDAY JANUARY Computing Overview

COURSE OUTLINE AND SCHEDULE: ASSIGNMENTS ARE DUE EACH MONDAY WEDNESDAY JANUARY Computing Overview COURSE OUTLINE AND SCHEDULE: ASSIGNMENTS ARE DUE EACH MONDAY WEDNESDAY JANUARY 22 1.0 Computing Overview 1.1 Course Introduction 1.1.1 PC Pro and A+ Certification (9:03) 1.2 Using the Simulator 1.2.1 Using

More information

MOBILedit Forensic Express

MOBILedit Forensic Express MOBILedit Forensic Express All-in-one phone forensic tool from pioneers in the field MOBILedit Forensic Express is a phone and cloud extractor, data analyzer and report generator all in one solution. A

More information

SD Card with Eclipse/Emulator

SD Card with Eclipse/Emulator SD Card with Eclipse/Emulator Creating the SD Card "image" file (a file representation of a physical SD Card) Assume Cygwin bash shell: $ cd c: $ mkdir sdcards $ cd sdcards $ Android\android-sdk\tools\mksdcard

More information

COURSE OUTLINE: A+ COMPREHENSIVE

COURSE OUTLINE: A+ COMPREHENSIVE COURSE OUTLINE: A+ COMPREHENSIVE Course Outline CompTIA A+ Comprehensive Chapter Outline 1. The Path of the PC Tech What is the CompTIA A+? How to Pass the A+ Exams 2. Operational Procedures Professionalism

More information

Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010

Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Course 10135B 5 Days Instructor-led, Hands-on Course Description This course will provide you with the knowledge and skills to configure

More information

Android Overview. Francesco Mercaldo, PhD

Android Overview. Francesco Mercaldo, PhD Android Overview Francesco Mercaldo, PhD Post-Doctoral researcher Corso di Sicurezza delle Reti e dei Sistemi Software Università degli Studi del Sannio (fmercaldo@unisannio.it) Things are not always what

More information

IT SYSTEMS ADMINISTRATOR PROGRAM

IT SYSTEMS ADMINISTRATOR PROGRAM NH5000 A+ Comprehensive 120 Total Hours COURSE TITLE: A+ Comprehensive COURSE OVERVIEW: After completing this course, students will be able to perform tasks such as: Installation Configuration Diagnosing

More information

Research and Design of Education and Teaching Resource Management System based on ASP.NET Technology

Research and Design of Education and Teaching Resource Management System based on ASP.NET Technology 2018 3rd International Conference on Education & Education Research (EDUER 2018) Research and Design of Education and Teaching Resource Management System based on ASP.NET Technology Jin Xin Science and

More information

A STUDY OF ANDROID OPERATING SYSTEM WITH RESPECT WITH USERS SATISFACTION

A STUDY OF ANDROID OPERATING SYSTEM WITH RESPECT WITH USERS SATISFACTION A STUDY OF ANDROID OPERATING SYSTEM WITH RESPECT WITH USERS SATISFACTION Ashish A Kulkarni 1, Pooja A Kulkarni 2 1 Assistant Professor, MIT School of Management Pune, (India) 2 Assistant Professor, NBN

More information

Android Forensics Concept

Android Forensics Concept Android Forensics Concept Written by Zlatko Jovanovic Widely use of personal handheld devices, opened the new area in computer forensics field, called phone, cell, or mobile forensics. In the last few

More information

20331B: Core Solutions of Microsoft SharePoint Server 2013

20331B: Core Solutions of Microsoft SharePoint Server 2013 20331B: Core Solutions of Microsoft SharePoint Server 2013 Course Details Course Code: Duration: Notes: 20331B 5 days This course syllabus should be used to determine whether the course is appropriate

More information

Lab Install Windows 8

Lab Install Windows 8 Introduction In this lab, you will install Windows 8.1 and 8.0. Recommended Equipment A computer with a blank hard disk drive Windows 8.1 and 8.0 installation DVD or USB flash drive Step 1: Starting the

More information

Development of a mobile application for manual traffic counts

Development of a mobile application for manual traffic counts Development of a mobile application for manual traffic counts Mohammad Ghanim 1,* and Khalid Khawaja 2 1 Department of Civil and Architectural Engineering, Qatar University, Doha, Qatar 2 Office of Academic

More information

Introduction to Android

Introduction to Android Introduction to Android http://myphonedeals.co.uk/blog/33-the-smartphone-os-complete-comparison-chart www.techradar.com/news/phone-and-communications/mobile-phones/ios7-vs-android-jelly-bean-vs-windows-phone-8-vs-bb10-1159893

More information

File Synchronization using API Google Drive on Android Operating System

File Synchronization using API Google Drive on Android Operating System File Synchronization using API Google Drive on Android Operating System Agustinus Noertjahyana, Kevin Darmawan, Justinus Andjarwirawan Informatics Engineering Department Petra Christian University Surabaya,

More information

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps

More information

Developing Enterprise Cloud Solutions with Azure

Developing Enterprise Cloud Solutions with Azure Developing Enterprise Cloud Solutions with Azure Java Focused 5 Day Course AUDIENCE FORMAT Developers and Software Architects Instructor-led with hands-on labs LEVEL 300 COURSE DESCRIPTION This course

More information

CompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018

CompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018 Course Outline 09 May 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training 5. ADA Compliant & JAWS Compatible

More information

How do I view the online program?

How do I view the online program? How to get started using online How do I view the online program? 1. Go online to www.essential-physics.com. 2. Select your state and curriculum. 3. Enter your 10-digit access code. opens. 1. 2. 3. www..com

More information

How to enter recovery mode android using pc

How to enter recovery mode android using pc How to enter recovery mode android using pc 6.7 Six Best Call Blocker Apps for Android. Join 250,000 subscribers and get a daily digest of news, geek trivia, and our feature articles. Lifeprint's Harry

More information

Android Application Development Course Code: AND-401 Version 7 Duration: 05 days

Android Application Development Course Code: AND-401 Version 7 Duration: 05 days Let s Reach For Excellence! TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC Address: 103 Pasteur, Dist.1, HCMC Tel: 08 38245819; 38239761 Email: traincert@tdt-tanduc.com Website: www.tdt-tanduc.com; www.tanducits.com

More information

CompTIA A+ Certification: Labs. Course Outline. CompTIA A+ Certification: Labs. 07 Dec

CompTIA A+ Certification: Labs. Course Outline. CompTIA A+ Certification: Labs. 07 Dec Course Outline CompTIA A+ Certification: 220-902 Labs 07 Dec 2018 Contents 1. Expert Instructor-Led Training 2. ADA Compliant & JAWS Compatible Platform 3. State of the Art Educator Tools 4. Award Winning

More information

IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems

IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems 5.0 Introduction 1. What controls almost all functions on a computer? The operating system 5.1 Explain the purpose of an operating system 2.

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner ACCREDITATIONS EXAM INFORMATION The Certified Digital Forensics Examiner exam is taken online through Mile2 s Assessment and Certification System ( MACS ), which is

More information

Documentation on File Management for website

Documentation on File Management for website Documentation on File Management for website File Manager The cpanel FILE MANAGER allows you to modify the files and contents of files that are part of your website. The FILE MANAGER allows point and click

More information

AccessData Advanced Forensics

AccessData Advanced Forensics This advanced five-day course provides the knowledge and skills necessary to install, configure and effectively use Forensic Toolkit (FTK ), FTK Imager Password Recovery Toolkit (PRTK ) and Registry Viewer.

More information

Understanding Storage I/O Behaviors of Mobile Applications. Louisiana State University Department of Computer Science and Engineering

Understanding Storage I/O Behaviors of Mobile Applications. Louisiana State University Department of Computer Science and Engineering Understanding Storage I/O Behaviors of Mobile Applications Jace Courville jcourv@csc.lsu.edu Feng Chen fchen@csc.lsu.edu Louisiana State University Department of Computer Science and Engineering The Rise

More information

COPYRIGHTED MATERIAL. 1Hello ios! A Suitable Mac. ios Developer Essentials

COPYRIGHTED MATERIAL. 1Hello ios! A Suitable Mac. ios Developer Essentials 1Hello ios! Hello and welcome to the exciting world of ios application development. ios is Apple s operating system for mobile devices; the current version as of writing this book is 5.0. It was originally

More information

User Manual. Open platform E Line. Part Number: Version: 1. Date:

User Manual. Open platform E Line. Part Number: Version: 1. Date: User Manual E Line Part Number: 80860.850 Version: 1 Date: 2014-01-27 Valid for: SB7ECS-OPENPLATL-0007 Version Date Modifications 1 2014-01-27 First edition This manual, including all illustrations contained

More information

CompTIA A Exam 2 (Course & Labs) Course Outline. CompTIA A Exam 2 (Course & Labs) 05 Oct

CompTIA A Exam 2 (Course & Labs) Course Outline. CompTIA A Exam 2 (Course & Labs) 05 Oct Course Outline CompTIA A+ 220-902 Exam 2 (Course & Labs) 05 Oct 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

Design on Office Automation System based on Domino/Notes Lijun Wang1,a, Jiahui Wang2,b

Design on Office Automation System based on Domino/Notes Lijun Wang1,a, Jiahui Wang2,b 3rd International Conference on Management, Education Technology and Sports Science (METSS 2016) Design on Office Automation System based on Domino/Notes Lijun Wang1,a, Jiahui Wang2,b 1 Basic Teaching

More information

Contact Information. Contact Center Operating Hours. Other Contact Information. Contact Monday through Thursday Friday

Contact Information. Contact Center Operating Hours. Other Contact Information. Contact Monday through Thursday Friday Contact Information Contact Center Operating Hours Contact Monday through Thursday Friday Phone: 1.801.796.0944 8 AM 5 PM Eastern Time 8 AM 3 PM Eastern Time Online chat: http://support.paraben.com 10

More information

LO CompTIA A+ : (Exam ) Course Outline Sep 2018

LO CompTIA A+ : (Exam ) Course Outline Sep 2018 Course Outline LO CompTIA A+ : (Exam 220902) 09 Sep 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training

More information

Lab 3-1 Lab Installing Kofax Capture 10

Lab 3-1 Lab Installing Kofax Capture 10 In the following lab instructions, you re going to install and license Kofax Capture, turn on User Tracking, review the product documentation, and prepare your system for the lab exercises in this course.

More information

Android System Development Training 4-day session

Android System Development Training 4-day session Android System Development Training 4-day session Title Android System Development Training Overview Understanding the Android Internals Understanding the Android Build System Customizing Android for a

More information

National College of Ireland BSc in Computing 2015/2016. Mahmoud Azzam LocalDeal. Final Report

National College of Ireland BSc in Computing 2015/2016. Mahmoud Azzam LocalDeal. Final Report National College of Ireland BSc in Computing 2015/2016 Mahmoud Azzam 13110241 X13110241@student.ncirl.ie LocalDeal Final Report Table of Contents Table of Contents Executive Summary... 4 1 Introduction...

More information