Difference between pages "Upcoming events" and "Cloud Forensics Bibliography"

From Forensics Wiki
(Difference between pages)
Jump to: navigation, search
 
 
Line 1: Line 1:
Here is a BY DATE listing of '''upcoming conferences and training events''' that pertain to [[digital forensics]]. Some of these duplicate the generic [[conferences]], but have specific dates/locations for the upcoming conference/training event.
+
'''In chronological order, oldest to most recent'''
  
<b> The Conference and Training List is provided by the American Academy of Forensic Sciences (AAFS) Digital and Multi-media Listserv</b>
+
<bibtex>
<i> (Subscribe by sending an email to listserv@lists.mitre.org with message body containing SUBSCRIBE AAFS-DIGITAL-MULTIMEDIA-LIST)</i>
+
@article{Dykstra12,
<b> Any requests for additions, deletions or corrections to this list should be sent by email to David Baker <i>(bakerd AT mitre.org)</i>. </b>
+
author = "Josiah Dykstra and Alan T. Sherman",
 +
title = "Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques",
 +
journal = "Digital Investigation",
 +
volume = {9},
 +
year = {2012},
 +
pages = {S90--S98},
 +
  url="http://ww.cs.umbc.edu/~dykstra/DFRWS_Dykstra.pdf"
 +
</bibtex>
  
== Calls For Papers ==
+
<bibtex>
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
@inproceedings{ISSA,
|- style="background:#bfbfbf; font-weight: bold"
+
author = "Waldo Delport and Michael Kohn and Martin S. Olivier",
! Title
+
title = "Isolating a cloud instance for a digital forensic investigation",
! Date/Location
+
  booktitle={Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference},
! Website
+
  year={August 2011},
|-
+
  organization={ISSA},
|}
+
</bibtex>
  
== Conferences ==
+
<bibtex>
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
@article{CLSR,
|- style="background:#bfbfbf; font-weight: bold"
+
author = "Esther George and Stephen Mason",
! Title
+
title = "Digital evidence and ‘cloud’ computing",
! Date/Location
+
journal = "Computer Law & Security Review",
! Website
+
volume = {27},
|-
+
issue = {5},
|Department of Defense CyberCrime Conference 2007
+
year = {September 2011},
|Jan 21-26, St. Louis, MO
+
pages = {524--528}
|http://www.technologyforums.com/7cc/
+
</bibtex>
|-
+
|Third Annual IFIP WG 11.9 International Conference on Digital Forensics
+
|Jan 28-31, Orlando, FL
+
|http://www.cis.utulsa.edu/ifip119/Conferences/WG11-9CallForPapers.asp
+
|-
+
|59th Annual Meeting of American Academy of Forensic Science
+
|Feb 19-24, San Antonio, TX
+
|http://www.aafs.org/default.asp?section_id=meetings&page_id=aafs_annual_meeting
+
|-
+
|BlackHat Federal 2007 Briefings & Training
+
|Feb 26-Mar 01, Arlington, VA
+
|http://www.blackhat.com/html/bh-link/briefings.html
+
|-
+
|CyberCrime Summit 2007
+
|Mar 19-23, Atlanta, GA
+
|http://www.cybercrimesummit.com/index.htm
+
|-
+
|SHMOOCon 2007
+
|Mar 22-25, Washington, DC
+
|http://www.shmoocon.org/
+
|-
+
|2nd Workshop on Systematic Approaches to Digital Forensic Engineering
+
|Apr 10-12, Seattle, WA
+
|http://conf.ncku.edu.tw/sadfe/cfp.htm
+
|-
+
|CanSecWest 2007
+
|Apr 16-20, Vancouver, BC, Canada
+
|http://cansecwest.com/
+
|-
+
|Conference on Digital Forensics, Security and Law
+
|Apr 18-20, Washington, DC
+
|http://www.digitalforensics-conference.org/
+
|-
+
|IACIS Computer Forensic Training Event 2007
+
|Apr 23-May 04, Orlando, FL
+
|http://www.iacis.com/iacisv2/pages/training.php
+
|-
+
|Computer and Enterprise Investigations Conference (CEIC)
+
|May 06-09, Las Vegas, NV
+
|http://www.ceic2007.com/
+
|-
+
|22nd IFIP International Information Security Conference
+
|May 14-16, Sandton, South Africa
+
|http://www.sbs.co.za/ifipsec2007/
+
|-
+
|2007 Techno-Security Conference
+
|Jun 03-06, Myrtle Beach, SC
+
|http://www.techsec.com/html/Techno2007.html
+
|-
+
|Computer Security Institute NetSec '07
+
|Jun 11-13, Scottsdale, AZ
+
|http://www.gocsi.com/netsec/
+
|-
+
|2007 USENIX Annual Technical Conference
+
|Jun 17-22, Santa Clara, CA
+
|http://www.usenix.org/events/
+
|-
+
| Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) 2007
+
|Jul 12-13, Lucerne, Switzerland
+
|http://www.gi-ev.de/fachbereiche/sicherheit/fg/sidar/dimva/
+
|-
+
|16th USENIX Security Symposium
+
|Aug 06-10, Boston, MA
+
|http://www.usenix.org/events/
+
|-
+
|GMU 2007 Symposium
+
|Aug 06-10, George Mason University, Fairfax, VA
+
|http://www.rcfg.org
+
|-
+
|Digital Forensic Research Workshop 2007
+
|Aug 13-15, Pittsburgh, PA
+
|http://www.dfrws.org/2007/index.html
+
|-
+
|}
+
  
== On-going / Continuous Training ==
+
<bibtex>
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
@article{dykstraJournal,
|- style="background:#bfbfbf; font-weight: bold"
+
  author = "Josiah Dykstra and Alan. T. Sherman",
! Title
+
  title = "Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies",
! Date/Location or Venue
+
  journal ={Journal of Network Forensics},
! Website
+
  volume = {3},
|-
+
  number = {1},
|Basic Computer Examiner Course
+
  year = {Autumn, 2011},
|Computer Forensic Training Online
+
  pages = {19--31}
|http://www.cftco.com
+
}
|-
+
</bibtex>
|MaresWare Suite Training
+
|First full week every month, Atlanta, GA
+
|http://www.maresware.com/maresware/training/maresware.htm
+
|-
+
|Linux Data Forensics Training
+
|Distance Learning Format
+
|http://www.crazytrain.com/training.html
+
|-
+
|}
+
  
== Scheduled Training Courses ==
+
<bibtex>
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
@article{ruan,
|- style="background:#bfbfbf; font-weight: bold"
+
  title="Cloud forensics: An overview",
! Title
+
  author={Keyun Ruan and Joe Carthy and Tahar Kechadi and Mark Crosbie},
! Date/Location
+
  booktitle={Advances in Digital Forensics VII},
! Website
+
  year={2011},
! Limitation
+
  url="http://cloudforensicsresearch.org/publication/Cloud_Forensics_An_Overview_7th_IFIP.pdf"
|-
+
}
|Basic Data Recovery and Acquisition (BDRA)
+
 
|Jan 08-12, Phoenix, AZ
+
</bibtex>
|http://nw3c.org/ocr/courses_desc.cfm?cn=BDRA
+
<bibtex>
|Limited to Law Enforcement
+
 
|-
+
@inproceedings{ruanSurvey,
|First Responder to Digital Evidence Program (FRDE)
+
   title="Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis",
|Jan 09-11, FLETC, Glynco, GA
+
  author={Keyun Ruan and Ibrahim Baggili and Joe Carthy and Tahar Kechadi},
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
  booktitle={Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and Law},
|Limited to Law Enforcement
+
  year={2011},
|-
+
  organization={ADFSL},
|AccessData BootCamp
+
  url="http://www.cloudforensicsresearch.org/publication/Survey_on_Cloud_Forensics_and_Critical_Criteria_for_Cloud_Forensic_Capability_6th_ADFSL.pdf"
|Jan 09-11, London, England
+
}
|http://www.accessdata.com/training
+
</bibtex>
|-
+
 
|EnCase v5 Essentials
+
<bibtex>
|Jan 09-12, Los Angeles, CA and United Kingdom
+
@article{CloudForensics,
|http://www.guidancesoftware.com/training/schedule.asp
+
  author = {Mark Taylor and John Haggerty and David Gresty and David Lamb},
|-
+
  title = {Forensic investigation of cloud computing systems},
|EnCase v5 Intermediate Analysis and Reporting-Private Sector
+
  journal ={Network Security},
|Jan 09-12, Washington DC
+
  volume = {2011},
|http://www.guidancesoftware.com/training/schedule.asp
+
  number = {3},
|-
+
  year = {2011},
|CEH Ethical Hacking Certification Class    
+
  pages = {4--10},
|Jan 15-19, McLean VA
+
  url="http://www.whieb.com/download.jsp?address=/upload%2Fdoc%2F20110415%2Fforensic+investigation+of+cloud+computing+systems.pdf"
|http://www.securityuniversity.com/scheddate.php
+
}
|-
+
 
|AccessData BootCamp
+
</bibtex>
|Jan 16-18, Austin, TX
+
<bibtex>
|http://www.accessdata.com/training
+
 
|-
+
@inproceedings{birk,
|EnCase v5 FIM/Mobile Use of EE Live Forensics
+
  title="Technical Issues of Forensic Investigations in Cloud Computing Environments",
|Jan 16-19, Washington DC
+
  booktitle = {Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE)},
|http://www.guidancesoftware.com/training/schedule.asp
+
  author={Dominik Birk and Christoph Wegener},
|-
+
  year={2011},
|EnCase v5 Intermediate Analysis and Reporting
+
  organization={IEEE},
|Jan 16-19, Los Angeles, CA and United Kingdom
+
  address = {Oakland, CA, USA},
|http://www.guidancesoftware.com/training/schedule.asp
+
  url="http://code-foundation.de/stuff/2011-birk-cloud-forensics.pdf"
|-
+
}
|Cyber Counterterrorism Investigations Training Program (CCITP)
+
 
|Jan 22-Jan 26, FLETC, Glynco, GA
+
</bibtex>
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
 
|Limited to Law Enforcement
+
<bibtex>
|-
+
@article{Araiza11,
|AccessData Windows Forensics
+
  title="Electronic Discovery in the Cloud",
|Jan 23-25, Carrington, Manchester, England
+
  author={Alberto G. Araiza},
|http://www.accessdata.com/training
+
  journal={Duke Law and Technology Review},
|-
+
  volume = {8},
|EnCase Enterprise v5-Phase I
+
  year = {2011},
|Jan 23-26, Los Angeles, CA
+
  url="http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1222&context=dltr"
|http://www.guidancesoftware.com/training/schedule.asp
+
}
|-
+
</bibtex>
|EnCase v5 Advanced Computer Forensics
+
 
|Jan 23-26, Los Angeles, CA and Centennial, CO
+
<bibtex>
|http://www.guidancesoftware.com/training/schedule.asp
+
@article{Cross10,
|-
+
  title="E-Discovery and Cloud Computing: Control of ESI in the Cloud",
|EnCase v5 Essentials
+
  author={David D. Cross and Emily Kuwahara},
|Jan 23-26, Washington DC
+
  journal={EDDE Journal},
|http://www.guidancesoftware.com/training/schedule.asp
+
  volume = {1},
|-
+
  number = {2},
|EnCase Enterprise v5-Phase II
+
  year = {2010},
|Jan 29-Feb 01, Los Angeles, CA
+
  pages = {2--12},
|http://www.guidancesoftware.com/training/schedule.asp
+
  url="http://www.crowell.com/documents/E-Discovery-and-Cloud-Computing-Control-of-ESI-in-the-Cloud.pdf"
|-
+
}
|Applied Computer Forensics Boot Camp (CCE)
+
</bibtex>
|Jan 29-Feb 07 , Springfield, VA
+
 
|http://www.vigilar.com/training/cce
+
<bibtex>
|-
+
@book{Lil10,
|EnCase v5 FIM/Mobile Use of EE Live Forensics
+
  title="Digital Forensics for Network, Internet and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data",
|Jan 30-Feb 02, Los Angeles, CA
+
  author={Terrance V. Lillard},
|http://www.guidancesoftware.com/training/schedule.asp
+
  year={2010},
|-
+
  publisher={Syngress},
|EnCase v5 Intermediate Analysis and Reporting
+
}
|Jan 30-Feb 02, Washington DC
+
</bibtex>
|http://www.guidancesoftware.com/training/schedule.asp
+
 
|-
+
<bibtex>
|DataLifter Training
+
@inproceedings{Lu10,
|Feb 05-06, Chicago, IL
+
  title="Secure provenance: the essential of bread and butter of data forensics in cloud computing",
|http://www.datalifter.com/training.htm
+
  booktitle={Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10)},
|-
+
  author={Rongxing Lu and Xiaodong Lin and Xiaohui Liang and Xuemin Sherman Shen},
|SMART for Linux
+
  pages={282--292},
|05-08 Feb, Austin, TX
+
  year={2010},
|http://asrdata.com/training/training2.html
+
  address={New York, NY, USA},
|-
+
  organization={ACM},
|Intermediate Data Recovery and Analysis (IDRA)
+
  url="http://bbcr.uwaterloo.ca/~rxlu/paper/asiaccs185-lu.pdf"
|Feb 05-09, Phoenix, AZ
+
}
|http://nw3c.org/ocr/courses_desc.cfm?cn=IDRA
+
 
|Limited to Law Enforcement
+
</bibtex>
|-
+
 
|AccessData BootCamp
+
<bibtex>
|Feb 06-08, London, England
+
 
|http://www.accessdata.com/training
+
@inproceedings{Wol09,
|-
+
  title="Overcast: Forensic Discovery in Cloud Environments",
|AccessData Internet Forensics
+
  booktitle = {Proceedings of the 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (IMF '09)},
|Feb 06-08 , Dallas, TX
+
  author={Stephen D. Wolthusen},
|http://www.accessdata.com/training
+
  pages={3--9},
|-
+
  year={2009},
|AccessData Windows Forensics
+
  address={Washington, DC, USA},
|Feb 06-08, Boise, ID
+
  organization={IEEE Computer Society}
|http://www.accessdata.com/training
+
}
|-
+
 
|EnCase v5 Advanced Computer Forensics
+
</bibtex>
|Feb 06-09, Washington DC
+
 
|http://www.guidancesoftware.com/training/schedule.asp
+
 
|-
+
 
|EnCase v5 EnScript Programming-Phase II
+
[[Category:Bibliographies]]
|Feb 06-09, Los Angeles, CA
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase v5 Network Intrusion Investigations-Phase I
+
|Feb 06-09, Los Angeles, CA
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase v5 FIM/Mobile Use of EE Live Forensics
+
|Feb 06-09, United Kingdom
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase v5 Network Intrusion Investigations-Phase II
+
|Feb 12-15, Los Angeles, CA
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|AccessData BootCamp
+
|Feb 13-15, Albuquerque, NM
+
|http://www.accessdata.com/training
+
|-
+
|AccessData Windows Forensics
+
|Feb 13-15, Washington, DC
+
|http://www.accessdata.com/training
+
|-
+
|EnCase v5 Intermediate Analysis and Reporting-Private Sector
+
|Feb 13-16, Los Angeles, CA and United Kingdom
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase v5 Advanced Internet Examinations
+
|Feb 13-16, Washington DC
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase  eDiscovery with v5
+
|Feb 13-16, Washington DC
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|SMART Windows Data Forensics
+
|19-21 Feb, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|Applied Computer Forensics Boot Camp (CCE)
+
|Feb 19-23 , Redwood City, CA
+
|http://www.vigilar.com/training/cce
+
|-
+
|AccessData Windows Forensics
+
|Feb 20-22, Wyboston, BF, England
+
|http://www.accessdata.com/training
+
|-
+
|EnCase v5 NTFS-Phase I
+
|Feb 20-23, Washington DC
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase v5 Advanced Internet Examinations
+
|Feb 20-23, Phoenix, Arizona
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase v5 Advanced Computer Forensics
+
|Feb 20-23, United Kingdom
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase v5 Essentials
+
|Feb 20-23, Los Angeles, CA
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase v5 NTFS-Phase II
+
|Feb 26-Mar 01, Washington DC
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|Applied Computer Forensics Boot Camp (CCE)
+
|Feb 26-Mar 02 , Fort Lauderdale, FL
+
|http://www.vigilar.com/training/cce
+
|-
+
|AccessData BootCamp
+
|Feb 27-Mar 01, Davie, FL
+
|http://www.accessdata.com/training
+
|-
+
|EnCase v5 Essentials-Private Sector
+
|Feb 27-Mar 02, Washington DC
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase v5 Intermediate Analysis and Reporting
+
|Feb 27-Mar 02, Los Angeles, CA
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|Computer Network Investigations Training Program (CNITP)
+
|Mar 06-16, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|AccessData Windows Forensics
+
|Mar 06-08, Knoxville, TN
+
|http://www.accessdata.com/training
+
|-
+
|EnCase v5 Advanced Computer Forensics
+
|Mar 06-09, Los Angeles, CA
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase v5 Essentials
+
|Mar 06-09, United Kingdom
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase v5 Intermediate Analysis and Reporting-Private Sector
+
|Mar 06-09, Washington, DC
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|SMART for Linux
+
|12-15 Mar, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|AccessData BootCamp
+
|Mar 13-15, Boise, ID
+
|http://www.accessdata.com/training
+
|-
+
|AccessData Windows Forensics
+
|Mar 13-15, Chicago, IL
+
|http://www.accessdata.com/training
+
|-
+
|EnCase Enterprise v5-Phase I
+
|Mar 13-16, Washington DC
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase v5 Advanced Computer Forensics
+
|Mar 13-16, Washintgon DC
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase v5 Intermediate Analysis and Reporting
+
|Mar 13-16, United Kingdom
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase v5 Advanced Internet Examinations
+
|Mar 13-16, Los Angeles, CA
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|Computer Forensics First Responder
+
|Mar 14, Indianapolis, IN
+
|http://www.ifi-indy.org/ifi%20training/train.html
+
|-
+
|Advanced Data Forensics Topics
+
|19-21 Mar, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|EnCase Enterprise v5-Phase II
+
|Mar 19-22, Washington DC
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|Applied Computer Forensics Boot Camp (CCE)
+
|Mar 19-23 , Fort Lauderdale, FL and Atlanta, GA
+
|http://www.vigilar.com/training/cce
+
|-
+
|First Responder to Digital Evidence Program (FRDE)
+
|Mar 20-22, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|EnCase v5 FIM/Mobile Use of EE Live Forensics
+
|Mar 20-23, Washington DC
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase  eDiscovery with v5
+
|Mar 20-23, Los Angeles, CA
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase v5 Advanced Internet Examinations
+
|Mar 20-23, United Kingdom
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|AccessData Internet Forensics
+
|Mar 27-29 , London, England
+
|http://www.accessdata.com/training
+
|-
+
|AccessData Windows Forensics
+
|Mar 27-29, Albuquerque, NM
+
|http://www.accessdata.com/training
+
|-
+
|EnCase v5 Network Intrusion Investigations-Phase I
+
|Mar 27-30, United Kingdom
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase v5 Intermediate Analysis and Reporting-Private Sector
+
|Mar 27-30, Los Angeles, CA
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase v5 Intermediate Analysis and Reporting
+
|Mar 27-30, Washington DC
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|Cyber Counterterrorism Investigations Training Program (CCITP)
+
|Apr 02-06, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|Digital Evidence Acquisition Specialist Training Program (DEASTP)
+
|Apr 02-13, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|AccessData BootCamp
+
|Apr 03-05, Dallas, TX
+
|http://www.accessdata.com/training
+
|-
+
|EnCase v5 Advanced Internet Examinations
+
|Apr 03-06, Washington DC
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase v5 Essentials
+
|Apr 03-06, Los Angeles, CA
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|SMART for Linux
+
|09-12 Apr, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|Applied Computer Forensics Boot Camp (CCE)
+
|Apr 09-13 , Springfield, VA
+
|http://www.vigilar.com/training/cce
+
|-
+
|EnCase v5 Intermediate Analysis and Reporting
+
|Apr 10-13, Los Angeles, CA
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase v5 NTFS-Phase I
+
|Apr 10-13, Los Angeles, CA
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase v5 Network Intrusion Investigations-Phase I
+
|Apr 10-13, Washington DC
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|SMART Windows Data Forensics
+
|16-18 Apr, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|EnCase v5 Network Intrusion Investigations-Phase II
+
|Apr 16-19, Washington DC
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase v5 NTFS-Phase II
+
|Apr 16-19, Los Angeles, CA
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|AccessData Windows Forensics
+
|Apr 17-19, Austin, TX
+
|http://www.accessdata.com/training
+
|-
+
|EnCase Enterprise v5-Phase II
+
|Apr 17-20, United Kingdom
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|Seized Computer Evidence Recovery Specialist (SCERS)
+
|Apr 23-May 04, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|AccessData Windows Forensics
+
|Apr 24-26, Boise, ID and Solna, Sweden
+
|http://www.accessdata.com/training
+
|-
+
|EnCase v5 Intermediate Analysis and Reporting-Private Sector
+
|Apr 24-27, United Kingdom
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase v5 FIM/Mobile Use of EE Live Forensics
+
|Apr 24-27, Los Angeles, CA
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase v5 Essentials
+
|Apr 24-27, Washington DC
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase v5 Intermediate Analysis and Reporting
+
|May 01-04, Washington DC
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|EnCase v5 Essentials
+
|May 01-04, United Kingdom
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|SMART for Linux
+
|07-10 May, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|AccessData Internet Forensics
+
|May 08-10 , Albuquerque, NM
+
|http://www.accessdata.com/training
+
|-
+
|EnCase v5 Advanced Computer Forensics
+
|May 08-11, Washington DC
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|SMART Windows Data Forensics
+
|14-16 May, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|EnCase v5 Intermediate Analysis and Reporting
+
|May 15-18, United Kingdom
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|Computer Network Investigations Training Program (CNITP)
+
|May 15-25, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|AccessData Internet Forensics
+
|May 22-24 , Solna, Sweden
+
|http://www.accessdata.com/training
+
|-
+
|EnCase v5 Advanced Computer Forensics
+
|May 22-25, United Kingdom
+
|http://www.guidancesoftware.com/training/schedule.asp
+
|-
+
|First Responder to Digital Evidence Program (FRDE)
+
|May 30-Jun 01, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|Computer Forensics First Responder
+
|May 31, Indianapolis, IN
+
|http://www.ifi-indy.org/ifi%20training/train.html
+
|-
+
|AccessData BootCamp
+
|May 31-Jun 02, Myrtle Beach, SC
+
|http://www.accessdata.com/training
+
|-
+
|AccessData Windows Forensics
+
|May 31-Jun 02, Myrtle Beach, SC
+
|http://www.accessdata.com/training
+
|-
+
|SMART for Linux
+
|04-07 Jun, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|AccessData BootCamp
+
|Jun 05-07, Albuquerque, NM
+
|http://www.accessdata.com/training
+
|-
+
|Advanced Data Forensics Topics
+
|11-13 Jun, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|Digital Evidence Acquisition Specialist Training Program (DEASTP)
+
|Jun 11-22, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|AccessData Internet Forensics
+
|Jun 12-14 , Boise, ID
+
|http://www.accessdata.com/training
+
|-
+
|AccessData Windows Forensics
+
|Jun 19-21, Dallas, TX
+
|http://www.accessdata.com/training
+
|-
+
|SMART for Linux
+
|09-12 Jul, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|Cyber Counterterrorism Investigations Training Program (CCITP)
+
|Jul 09-13, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|SMART Windows Data Forensics
+
|16-18 Jul, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|Seized Computer Evidence Recovery Specialist (SCERS)
+
|Jul 16-27, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|AccessData BootCamp
+
|Jul 17-19, Boise, ID
+
|http://www.accessdata.com/training
+
|-
+
|AccessData Windows Forensics
+
|Jul 24-26, Albuquerque, NM
+
|http://www.accessdata.com/training
+
|-
+
|First Responder to Digital Evidence Program (FRDE)
+
|Jul 31-Aug 02, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|SMART for Linux
+
|06-09 Aug, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|Computer Network Investigations Training Program (CNITP)
+
|Aug 14-24, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|SMART Linux Data Forensics
+
|13-15 Aug, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|AccessData Internet Forensics
+
|Aug 14-16 , Austin, TX
+
|http://www.accessdata.com/training
+
|-
+
|SMART for Linux
+
|03-06 Sep, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|First Responder to Digital Evidence Program (FRDE)
+
|Sep 11-13, FLETC, Glynco, GA
+
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
|Limited to Law Enforcement
+
|-
+
|AccessData Applied Decryption
+
|Sep 11-13, Dallas, TX
+
|http://www.accessdata.com/training
+
|-
+
|Enterprise Data Forensics
+
|17-19 Sep, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|AccessData Applied Decryption
+
|Sep 25-27, Chicago, IL
+
|http://www.accessdata.com/training
+
|-
+
|AccessData BootCamp
+
|Sep 25-27, Solna, SE
+
|http://www.accessdata.com/training
+
|-
+
|SMART for Linux
+
|01-04 Oct, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|SMART Windows Data Forensics
+
|08-10 Oct, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|SMART for Linux
+
|05-08 Nov, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|AccessData BootCamp
+
|Nov 06-08, Austin, TX
+
|http://www.accessdata.com/training
+
|-
+
|AccessData Windows Forensics
+
|Nov 06-08, Solna, Sweden
+
|http://www.accessdata.com/training
+
|-
+
|SMART Linux Data Forensics
+
|12-14 Nov, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|SMART for Linux
+
|03-06 Dec, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|AccessData Internet Forensics
+
|Dec 04-06 , Solna, Sweden
+
|http://www.accessdata.com/training
+
|-
+
|Enterprise Data Forensics
+
|10-12 Dec, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|}
+

Revision as of 09:43, 27 June 2012

In chronological order, oldest to most recent

Josiah Dykstra, Alan T. Sherman - Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
Digital Investigation 9:S90--S98,2012
http://ww.cs.umbc.edu/~dykstra/DFRWS_Dykstra.pdf
Bibtex
Author : Josiah Dykstra, Alan T. Sherman
Title : Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
In : Digital Investigation -
Address :
Date : 2012

Waldo Delport, Michael Kohn, Martin S. Olivier - Isolating a cloud instance for a digital forensic investigation
Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference ,August 2011
Bibtex
Author : Waldo Delport, Michael Kohn, Martin S. Olivier
Title : Isolating a cloud instance for a digital forensic investigation
In : Proceedings of the 2011 Information Security for South Africa (ISSA 2011) Conference -
Address :
Date : August 2011

Esther George, Stephen Mason - Digital evidence and ‘cloud’ computing
Computer Law & Security Review 27:524--528,September 2011
Bibtex
Author : Esther George, Stephen Mason
Title : Digital evidence and ‘cloud’ computing
In : Computer Law & Security Review -
Address :
Date : September 2011

Josiah Dykstra, Alan. T. Sherman - Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies
Journal of Network Forensics 3(1):19--31,Autumn, 2011
Bibtex
Author : Josiah Dykstra, Alan. T. Sherman
Title : Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies
In : Journal of Network Forensics -
Address :
Date : Autumn, 2011

Keyun Ruan, Joe Carthy, Tahar Kechadi, Mark Crosbie - Cloud forensics: An overview
,2011
http://cloudforensicsresearch.org/publication/Cloud_Forensics_An_Overview_7th_IFIP.pdf
Bibtex
Author : Keyun Ruan, Joe Carthy, Tahar Kechadi, Mark Crosbie
Title : Cloud forensics: An overview
In : -
Address :
Date : 2011

Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi - Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis
Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and Law ,2011
http://www.cloudforensicsresearch.org/publication/Survey_on_Cloud_Forensics_and_Critical_Criteria_for_Cloud_Forensic_Capability_6th_ADFSL.pdf
Bibtex
Author : Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi
Title : Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis
In : Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and Law -
Address :
Date : 2011

Mark Taylor, John Haggerty, David Gresty, David Lamb - Forensic investigation of cloud computing systems
Network Security 2011(3):4--10,2011
http://www.whieb.com/download.jsp?address=/upload%2Fdoc%2F20110415%2Fforensic+investigation+of+cloud+computing+systems.pdf
Bibtex
Author : Mark Taylor, John Haggerty, David Gresty, David Lamb
Title : Forensic investigation of cloud computing systems
In : Network Security -
Address :
Date : 2011

Dominik Birk, Christoph Wegener - Technical Issues of Forensic Investigations in Cloud Computing Environments
Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) , Oakland, CA, USA,2011
http://code-foundation.de/stuff/2011-birk-cloud-forensics.pdf
Bibtex
Author : Dominik Birk, Christoph Wegener
Title : Technical Issues of Forensic Investigations in Cloud Computing Environments
In : Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) -
Address : Oakland, CA, USA
Date : 2011

Alberto G. Araiza - Electronic Discovery in the Cloud
Duke Law and Technology Review 8,2011
http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1222&context=dltr
Bibtex
Author : Alberto G. Araiza
Title : Electronic Discovery in the Cloud
In : Duke Law and Technology Review -
Address :
Date : 2011

David D. Cross, Emily Kuwahara - E-Discovery and Cloud Computing: Control of ESI in the Cloud
EDDE Journal 1(2):2--12,2010
http://www.crowell.com/documents/E-Discovery-and-Cloud-Computing-Control-of-ESI-in-the-Cloud.pdf
Bibtex
Author : David D. Cross, Emily Kuwahara
Title : E-Discovery and Cloud Computing: Control of ESI in the Cloud
In : EDDE Journal -
Address :
Date : 2010

Terrance V. Lillard - Digital Forensics for Network, Internet and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data
Syngress,2010
Bibtex
Author : Terrance V. Lillard
Title : Digital Forensics for Network, Internet and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data
In : -
Address :
Date : 2010

Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin Sherman Shen - Secure provenance: the essential of bread and butter of data forensics in cloud computing
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10) pp. 282--292, New York, NY, USA,2010
http://bbcr.uwaterloo.ca/~rxlu/paper/asiaccs185-lu.pdf
Bibtex
Author : Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin Sherman Shen
Title : Secure provenance: the essential of bread and butter of data forensics in cloud computing
In : Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10) -
Address : New York, NY, USA
Date : 2010

Stephen D. Wolthusen - Overcast: Forensic Discovery in Cloud Environments
Proceedings of the 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (IMF '09) pp. 3--9, Washington, DC, USA,2009
Bibtex
Author : Stephen D. Wolthusen
Title : Overcast: Forensic Discovery in Cloud Environments
In : Proceedings of the 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (IMF '09) -
Address : Washington, DC, USA
Date : 2009