Learning

VK200 Verakey Examinations

Date

24

March

2026

9:00 am

9:00 am

Venue

Online Training

Industry

Private Sector

Course Length

4 Days

Difficulty

Advanced-level

Delivery Method

Live Online

Share this course with your network

Overview

This course details the mobile device extraction capabilities of Magnet Verakey combined with the mobile analysis capabilities of Magnet Axiom Cyber. Students will learn relevant skills and training on how to extract data from iOS and Android devices and learn to leverage the data outputs in relation to a wide range of enterprise style investigations. These modules of instruction will build the participants’ ability to understand how to access data effectively and efficiently from mobile devices using Magnet Verakey. Modules will also build upon the core concepts of iOS and Android analysis, including log analysis and operating system artifacts for the purposes of enterprise style investigations such as insider threats, data exfiltration and compromised devices.

Course Prerequisites

None.

Course Completion

Magnet Certified Verakey Examiner (MCVK) - Prerequisite: Must have attended VK200 (This an online process which is free, Pass score = 80% or higher, Certification lasts 2 years.)

Course Modules

Course modules

Module 1: Course introduction

• Meet the instructor and other students while seeing what’s expected for the week.

• Install Magnet Axiom Cyber and other open-source tools and files that are needed for the course completion.

• A discussion of mobile evidence handling considerations within investigations, including the current state of mobile forensics and how that impacts enterprise devices.

Module 2: Ios device security within enterprise environments

• Understand the encryption methodologies used by Apple within their mobile operating systems and how they impact the collection of data from devices.

• Gain insight into Apple’s File Data Protection system, including hardware such as the Secure Enclave.

• Learn how iOS/iPadOS devices with an MDM (Mobile Device Management) profile can be configured and how this forensically impacts the data available from managed devices.

Module 3: Android device security within enterprise environments

• Gain an understanding of the encryption methodologies used by Android devices and how this impacts the collection of data from devices.

• Understand the fragmentation of Android devices and the implementation of an open-source operating system amongst a wide variety of different hardware.

• Learn how Android devices with an MDM (Mobile Device Management) profile can be configured and how this forensically impacts the data available from managed devices.

Module 4: Verakey introduction and settings

• Learn how to set up and configure the Verakey.

• Understand the settings of the Verakey and how they can be configured for different types of investigations.

• Gain an understanding of how the Verakey software and hardware is managed.

Module 5: Verakey acquisitions, outputs, & stored results

• Understand the different types of consent-based extractions available with Verakey.

• Gain an understanding of the different workflow options with Verakey.

• Learn and understand about Verakey support and how to interpret the support matrices.

• Learn how to access and extract data from iOS and Android devices, including those enrolled with an MDM (Mobile Device Management) profile.

• Understand the results that Verakey outputs, including progress reports and stored results.

Module 6: Processing Verakey outputs with Magnet Axiom Cyber

• Understand best practices for transporting data from the Verakey

• Learn how to correctly process data extracted by Verakey in Axiom Cyber.

• Students will learn how to connect a Verakey unit into the Magnet Forensics suite of products.

• Students will gain an understanding of the different settings with Axiom Cyber Process and how they impact the processing of data.

• Learn how to process file types that are not natively supported by Axiom Cyber.

Module 7: Axiom Cyber—operating system analysis

• Understand core operating system artifacts from both iOS and Android devices.

• Learn how to make use of tools such as the Mobile View and Timeline explorer within Axiom Cyber.

• Students will learn how specific artifacts relating to iOS and Android devices can be applied to investigations such as theft, data exfiltration, and extortion.

• Module 8: Axiom Cyber—pattern of life and log analysis

• Understand the different types of logs that are available from iOS devices, such as Unified Logs and File System Events.

• Understand the different types of logs that are available from Android devices.

• Learn about pattern of life analysis when examining mobile devices and how they can be interpreted and interrogated by Axiom Cyber.

• Students will gain an understanding of how different tools within Axiom Cyber including Route View and Connections, can be used to investigate a wide range of case types including compromised devices and asset misuse.

Module 9: Axiom Cyber—communications & email analysis

This module will focus on communications and email data available from iOS and Android devices.

• Students will gain an understanding of tools such as Conversation View and the Email Explorer within Axiom Cyber.

• Understand the different types of web analysis artifacts available within Axiom Cyber, and how they can be applied to a range of investigation types including phishing and insider trading.

Module 10: Axiom Cyber—reporting

• This module will focus on best practices to enable users to report on findings within Axiom Cyber.

• Students will gain an understanding of the different types of exports available within Axiom Cyber, including Portable Case management.

• Learn how to enable better reporting from Axiom Cyber using Magnet Exhibit Builder.

Any questions?

Unit 15 Marston Business Park, Lower Hazeldines, Marston Moretaine, Bedfordshire, MK43 0XT

Contact us

We strive for the latest and greatest.

We are committed to staying at the forefront of innovation by continuously researching new techniques and solutions. If there's something specific you need that isn't listed on our website, please don’t hesitate to reach out—we’re here to help. We understand that important tasks often arise unexpectedly, and whenever possible, we’ll make every effort to accommodate urgent requests promptly and efficiently.

African american employee uses surveillance footage to monitor traffic
Contact Us

Want to know more about this course?
Contact us today.

Thank you!
Your submission has been received!
Oops! Something went wrong while submitting the form.