Learning

AX350 Axiom macOS Examinations

Date

09

December

2025

9:00 am

9:00 am

Venue

Birmingham, UK

Industry

Police

Military

Government

Private Sector

Course Length

4 Days

Difficulty

Advanced-level

Delivery Method

Classroom

Share this course with your network

Overview

AX350 is an expert-level four-day training course, designed for participants who understand digital forensics fundamentals, basic Axiom usage, and are seeking to expand their forensic investigative skills targeting Mac computers. You can purchase training classes directly online using a credit card or if payment by purchase order is required, please request a quotation from sales@magnetforensics.com.

Course Prerequisites

Because AX350 is an expert-level course, it is strongly recommended that students first complete Magnet Axiom Examinations (AX200). AX200 will provide a thorough understanding of Axiom that will help students focus on the Macintosh based forensic artifacts and investigations in AX350.

Course Completion

Magnet Certified macOS Examiner (MCME) - Prerequisite: Must have attended AX350 (This an online process which is free, Pass score = 80% or higher, Certification lasts 2 years.)

Course Modules

AX350 is an expert-level four-day training course, designed for participants who understand digital forensics fundamentals, basic Axiom usage, and are seeking to expand their forensic investigative skills targeting Mac computers.

Students will investigate a scenario involving network and computer intrusions, data theft, and distribution of stolen data, including possible attempts to market the stolen data via the dark web. The four-day course will take the student from receipt of initial information to the on-scene response, ending with the laboratory phase of artifact analysis and reporting.

Topics covered include live box triage and acquisition, dead box preview and acquisition, encryption remediation, case processing and examination, and both forensic and investigative analysis.

Course Modules

Module 1: Course introduction and Magnet Axiom installation

An introduction as to what to expect throughout the course for students as well as an overview of Axiom, its system requirements, and installation information.

Module 2: Course scenario and macOS overview

Dual focus areas in this module include a detailed training scenario that will set the stage for the course and provide investigative guidance for the duration of the training week and an overview of Mac computing to level-set students regardless of their experience with Apple products. Learn about the macOS operating system and APFS file system, including boot considerations, Mac desktop orientation, APFS internals, property lists, Unix paths, Mac search and indexing, Apple virtual assistant, and backups.

Module 3: Mac first responder

Discuss activities and decisions that are part of initial investigation involving Mac computers, including addressing non-removable media, T2 chips, physical connectivity to a target Mac, user-level access, RAM acquisition, encryption awareness, live box triage, and dead box preview.

Module 4: Mac acquisition and processing

Discuss tools, methods, and options for forensically acquiring Mac digital evidence including internal and external data storage devices, methods for defeating encryption, recovering passwords and recovery keys, and processing Mac evidence with Axiom.

Module 5: System analysis of macOS/APFS

Mac system analysis includes the physical, logical, file system, and application layers of the digital storage device model. Focus areas include the macOS operating system, rebuilt desktop, network interfaces and hosts, USB connections and devices, mobile device backups, system logs, and more.

Module 6: User accounts

Areas of focus related to user accounts include both local user accounts and internet accounts. Local accounts that are active on the system, those accounts with administrator-level rights, permissions, and privileges, and deleted accounts are all explored. Apple cloud accounts, mobile device owner accounts, as well as account passwords and tokens are also included.

Module 7: Intrusion and unauthorised access

Digital forensics is increasingly about incident response. This module will cover artifacts pertaining to threat actors and their methods of obtaining unauthorized access to computers and networks, however the techniques used are equally applicable to most other digital forensic examinations. Artifact areas include the Safari web browser, media files, documents, and others that may be useful to establish the computer investigated was used in an intrusion event. Tools and methods commonly used to gain and exploit access are covered, including Metasploit, Zenmap/nmap, secure shell, and file transfer protocol. Students will use a method of timeline analysis to help the evidence tell the story it wants to tell.

Module 8: File analysis and corroboration

File analysis is used to investigate stolen files, data, and other intellectual property as well as corroboration of any preliminary investigation that was done prior to the forensic examination stage including information received from confidential sources and other witnesses. Areas of focus include cloud file storage and sharing, printer artifacts, local file access artifacts, instant messaging, email, and local encrypted archives.

Module 9: Backups and removable devices

Mac backups are often found on removable devices and working evidence found on removable devices associated with a Mac computer potentially present the investigative team with new or corroborative evidence. Areas of focus include extended attributes, Mac antimalware and protection systems, and leveraging media analysis in Axiom.

Module 10: Investigative conclusions and final reports

This module is a compendium of small investigators notes that are scattered throughout the training material calling out new investigative facts as they are learned. Gathered in one module, the investigators notes present a form of narrative that details the investigation from beginning to end. Students can also generate a final Axiom report they can take with them for future review. The content of this module, together with a comprehensive Axiom case report, can help students recall the lessons learned during class to use as a guide during real world investigations. Because investigators notes tie directly back to the relevant training modules, students who successfully complete this course can conduct future investigations with more confidence through reinforcement and do not have to simply rely on their ability to memorize what was discussed in class.

Any questions?

Unit 15 Marston Business Park, Lower Hazeldines, Marston Moretaine, Bedfordshire, MK43 0XT

Contact us

We strive for the latest and greatest.

We are committed to staying at the forefront of innovation by continuously researching new techniques and solutions. If there's something specific you need that isn't listed on our website, please don’t hesitate to reach out—we’re here to help. We understand that important tasks often arise unexpectedly, and whenever possible, we’ll make every effort to accommodate urgent requests promptly and efficiently.

African american employee uses surveillance footage to monitor traffic
Contact Us

Want to know more about this course?
Contact us today.

Thank you!
Your submission has been received!
Oops! Something went wrong while submitting the form.