Webinar schedule

webinar name Dates

Learn Belkasoft X with Belkasoft's CEO

Yuri Gubanov

Learn about Belkasoft's new digital forensics and incident response product Belkasoft X, its benefits and how to migrate to X from the older Evidence Center.

How Belkasoft X can help you to deal with locked iPhones?

Elena Mishkareva

During this webinar we will discuss various methods that allow data acquisition from locked iPhones and available in the recently released Belkasoft Evidence Center X, an easy-to-use and powerful digital forensics and incident response solution which simplifies and accelerates a digital investigation workflow.

December 1, 2020
webinar name Dates

Conozca Belkasoft Evidence Center X

Maria Khripun

25.11.2020
webinar name Dates

Was gibt es Neues in Belkasoft Evidence Center X?

Alina Shmakova

TBD
webinar name

eDiscovery with Belkasoft Evidence Center

Over the past decade Electronically Stored Information (ESI) became exponentially more diverse, extensive, and widespread, both individuals and businesses store their data in electronic formats more than ever. And that’s where eDiscovery and digital forensics pop up, as with exponential growth of ESI came the need to discover different types of data. Belkasoft Evidence Center is primarily a digital forensic tool, but it can be quite handy when you have an eDiscovery case.

Bypassing iPhone's USB restricted mode with Belkasoft Evidence Center

Every new security feature in iOS means a certain challenge for digital forensic practitioners dealing with an iDevice as an evidence. And that’s where Belkasoft Evidence Center, the holistic digital forensic solution, can be useful, as it is evolving all the time and provides its customers with the cutting-edge technologies like iOS USB restricted mode workaround. Watch the webinar to learn how to use Belkasoft Evidence Center to bypass iOS USB restricted mode.

Incident investigations with Belkasoft

Incident Investigations module is designed to help users investigate hacking attempts of Windows-based computers. By analyzing several sources—such as registry entries, event logs, and memory dumps—it can find traces of attacks, which typically correspond to tricks used by hackers to penetrate a company's IT infrastructure. Watch the webinar to find out about cyber kill chain, how Belkasoft utilizes it, and where the artifacts worth examining are located on BEC's interface.

WhatsApp forensics with Belkasoft Evidence Center

Watch the webinar to learn all the ways of extracting WhatsApp data from users’ smartphones and computers.

Keychain extraction and agent-based acquisition

In this video, Belkasoft experts will tell you about the important feature of every iOS device - keychain. With Belkasoft Evidence Center, you will be able not only to extract keychain but also use it for subsequent decryption of encrypted data.

Benefits of remote forensics

Watch this webinar to learn how you can use Belkasoft Evidence Center for remote device acquisition.

iPhone's DFU practical guide

Belkasoft expert is speaking about the checkm8-based iOS acquisition feature of Belkasoft Evidence Center digital forensic software, and in particular, about the process of entering so called "DFU mode" on various iPhone models, for DFU is the first crucial step in order to acquire a device image.

Belkasoft safari webinar

Happy All Fools Day from Belkasoft! This is a fun webinar on both wild life encounters and digital forensics!

Locked iPhone acquisition with Belkasoft Evidence Center

In this webinar, we discuss what types of data can be extracted from locked iPhones with the help of checkm8-based acquisition feature of Belkasoft Evidence Center version.

Full file system iPhone acquisition with Belkasoft Evidence Center checkm8 feature

In this webinar, we explain what is checkm8 and why this exploit is a game changer for mobile forensics of Apple devices. We discuss differences between checkm8 and checkra1n and show how Belkasoft Evidence Center can help you to acquire iPhone data in an easy and automated way on Windows PC.

Agent-based iOS acquisition with Belkasoft Evidence Center

This Belkasoft webinar is devoted to the iOS acquisition based on the agent approach. Belkasoft allows you to acquire a full file system copy from some iOS versions even without a jailbreak. Learn about requirements for successfull agent-based acquisition of an iPhone or an iPad, and also get updates about checkra1n support by Belkasoft.

Belkasoft Evidence Center as first responder capability for companies and governments

Two experienced and prominent law enforcement professionals are discussing the importance of First Responder Capability for Companies and Governments.

Mobile device acquisition with Belkasoft

Our team will summarize and show you the available toolbox of BEC regarding both Android-based and Apple devices.

What's new in Belkasoft Evidence Center v.9.7

This webinar will cover all the new exciting features of the Belkasoft Evidence Center 2020 version 9.7. In this release, Belkasoft significantly expanded support for various mobile data sources and added support for more operating systems in its Remote Forensics module.

System files tricks for forensic investigations and incident response

With the help of Belkasoft Evidence Center, you will be able to find important artifacts inside system files, which will help you to solve a forensic case or an incident response case. This webinar will be useful for both law enforcement and the private companies' investigators.

SQLite forensics with Belkasoft

During this demo session, you will get a solid overview of the product features. We will discuss new trends and recently introduced artifacts, supported by BEC. In particular, we will cover restoring deleted data from SQLite, including Telegram secret chats, and memory analysis, including carving SQLites from RAM dumps.

Telegram messenger investigations on mobile devices

With 200M+ audience worldwide, Telegram Messenger is one of the most popular chat apps. Due to its increasing popularity it is met more and more often in digital investigations. Watch the webinar by Yuri Gubanov, CEO of Belkasoft, to learn more.

Forensic analysis of modern instant messengers

We will go through some popular messengers such as WhatsApp, Telegram, SnapChat and Skype. We will also cover RAM and SQLite forensics, needed to recover deleted or hidden chats.