{"id":82344,"date":"2024-11-01T06:25:00","date_gmt":"2024-11-01T06:25:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=82344"},"modified":"2025-10-29T09:43:22","modified_gmt":"2025-10-29T09:43:22","slug":"mobile-forensics-techniques-advanced-guide-digital-forensics","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/mobile-forensics-techniques-advanced-guide-digital-forensics\/","title":{"rendered":"Mobile Forensics Techniques: An Advanced Guide to Digital Forensics"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82344\" class=\"elementor elementor-82344\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-44bab59 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"44bab59\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-275efaa\" data-id=\"275efaa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9385b96 elementor-widget elementor-widget-text-editor\" data-id=\"9385b96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date<\/strong>: November 1, 2024<br \/><strong>Time<\/strong>: 9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST<br \/><strong>Topic<\/strong>: Mobile Forensics Techniques: An Advanced Guide to Digital Forensics<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p><p><strong style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Abstract<\/strong><span style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">: As businesses expand their digital operation network to include mobile devices for better access and convenience, threat actors aim to compromise these devices to gain access to the organization&#8217;s digital infrastructure. Consequently, these devices become both targets and sources of evidence for security incidents. In response to these evolving threats, this webinar, part of the series on <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/what-is-digital-forensics\/\">digital forensics<\/a>, explores the rapidly advancing field of <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/mobile-device-forensics\/\" target=\"_blank\" rel=\"noopener\">mobile device forensics<\/a>. It focuses on the latest techniques and tools used by forensic professionals to extract, analyze, and preserve data. Additionally, it sheds light on the forensic analysis of cloud data accessed through mobile devices, addressing the technical and ethical challenges, as well as trends associated with it. Attendees will gain a comprehensive understanding of mobile forensics processes, along with analytic skills and tactics necessary for security professionals to conduct mobile <a href=\"https:\/\/www.eccouncil.org\/train-certify\/computer-hacking-forensic-investigator-chfi\/\">forensic investigations<\/a> effectively.<\/span><\/p><p><strong>Key Takeaways:<\/strong><\/p><ul><li>Overview of mobile forensics principles<\/li><li>Mobile data types and extraction techniques<\/li><li>Advanced tools for mobile device forensic<\/li><li>Mobile application and cloud data forensic tactics<\/li><li>Legal and ethical considerations for mobile device forensics<\/li><\/ul><p><strong>Speaker:<\/strong><\/p><p><img decoding=\"async\" class=\" wp-image-82346 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/09\/Bennie-Cleveland.jpg\" alt=\"Bennie Cleveland\" width=\"192\" height=\"191\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/09\/Bennie-Cleveland.jpg 231w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/09\/Bennie-Cleveland-150x150.jpg 150w\" sizes=\"(max-width: 192px) 100vw, 192px\" \/><strong>Bennie L. Cleveland Jr.<\/strong>, AVP, Cyber Incident Management<br \/><strong>Bio:<\/strong> Bennie L. Cleveland Jr. is a distinguished cybersecurity leader with over two decades of experience in Cyber Incident Management, Enterprise Security, and Risk Management. Holding certifications such as the C|HFI, C|CISO, CISM, CISA, CRISC, and CIPM, Bennie has demonstrated exemplary leadership in Incident Response, Forensics, and Threat Intelligence. Currently serving as AVP of Cyber Incident Management at Chubb, he specializes in identifying high-risk vulnerabilities and mitigating ransomware. Bennie has a proven track record of accelerating incident resolution and enhancing business continuity. He is also a Cybersecurity Adjunct at Valley Forge Military Academy &amp; College, where he teaches Digital Forensics. His strategic oversight ensures robust compliance and comprehensive security measures.<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/Lm7i54NtP4Y?si=oFzKEPIb9gF1fXGY\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: November 1, 2024Time: 9:30 AM EDT | 8:30 AM CDT | 7:00 PM ISTTopic: Mobile Forensics Techniques: An Advanced Guide to Digital Forensics Watch Now Abstract: As businesses expand their digital operation network to include mobile devices for better access and convenience, threat actors aim to compromise these devices to gain access to the&hellip;<\/p>\n","protected":false},"author":77,"featured_media":82467,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-82344","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Essential Guide to Mobile Forensics: Tools and Techniques<\/title>\n<meta name=\"description\" content=\"This webinar covers mobile forensics principles, data extraction techniques, advanced tools, app and cloud forensics tactics, and the legal and ethical issues in mobile forensics.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/mobile-forensics-techniques-advanced-guide-digital-forensics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Forensics Techniques: An Advanced Guide to Digital Forensics\" \/>\n<meta property=\"og:description\" content=\"This webinar covers mobile forensics principles, data extraction techniques, advanced tools, app and cloud forensics tactics, and the legal and ethical issues in mobile forensics.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/mobile-forensics-techniques-advanced-guide-digital-forensics\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-01T06:25:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-29T09:43:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/1st-nov-bennie_465-310-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/mobile-forensics-techniques-advanced-guide-digital-forensics\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/mobile-forensics-techniques-advanced-guide-digital-forensics\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/bf00e50e3662b198f520ff05402bf17f\"},\"headline\":\"Mobile Forensics Techniques: An Advanced Guide to Digital Forensics\",\"datePublished\":\"2024-11-01T06:25:00+00:00\",\"dateModified\":\"2025-10-29T09:43:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/mobile-forensics-techniques-advanced-guide-digital-forensics\\\/\"},\"wordCount\":327,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/mobile-forensics-techniques-advanced-guide-digital-forensics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/1st-nov-bennie_465-310-1.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/mobile-forensics-techniques-advanced-guide-digital-forensics\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/mobile-forensics-techniques-advanced-guide-digital-forensics\\\/\",\"name\":\"Essential Guide to Mobile Forensics: Tools and Techniques\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/mobile-forensics-techniques-advanced-guide-digital-forensics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/mobile-forensics-techniques-advanced-guide-digital-forensics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/1st-nov-bennie_465-310-1.jpg\",\"datePublished\":\"2024-11-01T06:25:00+00:00\",\"dateModified\":\"2025-10-29T09:43:22+00:00\",\"description\":\"This webinar covers mobile forensics principles, data extraction techniques, advanced tools, app and cloud forensics tactics, and the legal and ethical issues in mobile forensics.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/mobile-forensics-techniques-advanced-guide-digital-forensics\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/mobile-forensics-techniques-advanced-guide-digital-forensics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/mobile-forensics-techniques-advanced-guide-digital-forensics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/1st-nov-bennie_465-310-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/1st-nov-bennie_465-310-1.jpg\",\"width\":1938,\"height\":1292,\"caption\":\"Mobile Forensics Techniques | Bennie\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/mobile-forensics-techniques-advanced-guide-digital-forensics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Mobile Forensics Techniques: An Advanced Guide to Digital Forensics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/bf00e50e3662b198f520ff05402bf17f\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Essential Guide to Mobile Forensics: Tools and Techniques","description":"This webinar covers mobile forensics principles, data extraction techniques, advanced tools, app and cloud forensics tactics, and the legal and ethical issues in mobile forensics.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/mobile-forensics-techniques-advanced-guide-digital-forensics\/","og_locale":"en_US","og_type":"article","og_title":"Mobile Forensics Techniques: An Advanced Guide to Digital Forensics","og_description":"This webinar covers mobile forensics principles, data extraction techniques, advanced tools, app and cloud forensics tactics, and the legal and ethical issues in mobile forensics.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/mobile-forensics-techniques-advanced-guide-digital-forensics\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-11-01T06:25:00+00:00","article_modified_time":"2025-10-29T09:43:22+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/1st-nov-bennie_465-310-1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/mobile-forensics-techniques-advanced-guide-digital-forensics\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/mobile-forensics-techniques-advanced-guide-digital-forensics\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/bf00e50e3662b198f520ff05402bf17f"},"headline":"Mobile Forensics Techniques: An Advanced Guide to Digital Forensics","datePublished":"2024-11-01T06:25:00+00:00","dateModified":"2025-10-29T09:43:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/mobile-forensics-techniques-advanced-guide-digital-forensics\/"},"wordCount":327,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/mobile-forensics-techniques-advanced-guide-digital-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/1st-nov-bennie_465-310-1.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/mobile-forensics-techniques-advanced-guide-digital-forensics\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/mobile-forensics-techniques-advanced-guide-digital-forensics\/","name":"Essential Guide to Mobile Forensics: Tools and Techniques","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/mobile-forensics-techniques-advanced-guide-digital-forensics\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/mobile-forensics-techniques-advanced-guide-digital-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/1st-nov-bennie_465-310-1.jpg","datePublished":"2024-11-01T06:25:00+00:00","dateModified":"2025-10-29T09:43:22+00:00","description":"This webinar covers mobile forensics principles, data extraction techniques, advanced tools, app and cloud forensics tactics, and the legal and ethical issues in mobile forensics.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/mobile-forensics-techniques-advanced-guide-digital-forensics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/mobile-forensics-techniques-advanced-guide-digital-forensics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/mobile-forensics-techniques-advanced-guide-digital-forensics\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/1st-nov-bennie_465-310-1.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/1st-nov-bennie_465-310-1.jpg","width":1938,"height":1292,"caption":"Mobile Forensics Techniques | Bennie"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/mobile-forensics-techniques-advanced-guide-digital-forensics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Mobile Forensics Techniques: An Advanced Guide to Digital Forensics"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/bf00e50e3662b198f520ff05402bf17f","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=82344"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82344\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/82467"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=82344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=82344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=82344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}