Difference between pages "Carver 2.0 Planning Page" and "Training Courses and Providers"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(Requirements)
 
(On-going / Continuous Training)
 
Line 1: Line 1:
This page is for planning Carver 2.0.
+
This is the list of Training Providers, who offer training courses of interest to practitioners and researchers in the field of Digital Forensics.   Conferences which may include training are located on the [[Upcoming_events]] page.
  
Please, do not delete text (ideas) here. Use something like this:
+
<b>PLEASE READ BEFORE YOU EDIT THE LIST BELOW</b><br>
 +
Some training providers offer on-going training courses that are available in an on-line "any time" format. Others have regularly scheduled training that is the same time each month.  Others have recurring training but are scheduled at various times throughout the year. Providers training courses should be listed in alphabetical order, and should be listed in the appropriate section.  Non-Commercial training is typically offered by governmental agencies or organizations that directly support law enforcement.  Tool Vendor training is training offered directly by a specific tool vendor, which may apply broadly, but generally is oriented to the vendor's specific tool (or tool suite). Commercial Training is training offered by commercial companies which may or may not be oriented to a specific tool/tool suite, but is offered by a company other than a tool vendor.
  
<pre>
+
<i>Some training opportunities may be <u>limited</u> to <b>Law Enforcement Only</b> or to a specific audience.  Such restrictions should be noted when known.</i>
<s>bad idea</s>
+
== On-going / Continuous Training ==
:: good idea
+
{| border="0" cellpadding="2" cellspacing="2" align="top"
</pre>
+
|- style="background:#bfbfbf; font-weight: bold"
 +
! width="40%"|Title
 +
! width="20%"|Date/Location
 +
! width="40%"|Website
 +
|-
 +
|- style="background:pink;align:left"
 +
! DISTANCE LEARNING
 +
|-
 +
|Basic Computer Examiner Course - Computer Forensic Training Online
 +
|Distance Learning Format
 +
|http://www.cftco.com
 +
|-
 +
|SANS On-Demand Training
 +
|Distance Learning Format
 +
|http://www.sans.org/ondemand/?portal=69456f95660ade45be29c00b0c14aea1
 +
|-
 +
|Champlain College - CCE Course
 +
|Online / Distance Learning Format
 +
|http://online.champlain.edu/computer-forensics-digital-investigation/CFDI_440
 +
|-
 +
|National Center for Media Forensics
 +
|Distance and Concentrated Audio/Video/Image Forensics
 +
|http://cam.ucdenver.edu/ncmf
 +
|-
 +
|- style="background:pink;align:left"
 +
!RECURRING TRAINING
 +
|-
 +
|Evidence Recovery for Windows 7&reg; operating system;
 +
|First full week every month<br>Brunswick, GA
 +
|http://www.internetcrimes.net
 +
|-
 +
|Evidence Recovery for Windows 8&reg;
 +
|Second full week every month<br>Brunswick, GA
 +
|http://www.internetcrimes.net
 +
|-
 +
|Evidence Recovery for Windows Server&reg; 2008 and 2012
 +
|Third full week every month<br>Brunswick, GA
 +
|http://www.internetcrimes.net
 +
|-
 +
|}
  
This will look like:
+
==Non-Commercial Training==
 +
{| border="0" cellpadding="2" cellspacing="2" align="top"
 +
|- style="background:#bfbfbf; font-weight: bold"
 +
! width="40%"|Title
 +
! width="40%"|Website
 +
! width="20%"|Limitation
 +
|-
 +
|Defense Cyber Investigations Training Academy (DCITA)
 +
|http://www.dc3.mil/dcita/dcitaAbout.php
 +
|Limited To Certain Roles within US Government Agencies[http://www.dc3.mil/dcita/dcitaRegistration.php (1)]
 +
|-
 +
|Federal Law Enforcement Training Center
 +
|http://www.fletc.gov/training/programs/technical-operations-division
 +
|Limited To Law Enforcement
 +
|-
 +
|MSU National Forensics Training Center
 +
|http://www.security.cse.msstate.edu/ftc
 +
|Limited To Law Enforcement
 +
|-
 +
|IACIS
 +
|http://www.iacis.com/training/course_listings
 +
|Limited To Law Enforcement and Affiliate Members of IACIS
 +
|-
 +
|SEARCH
 +
|http://www.search.org/programs/hightech/courses/
 +
|Limited To Law Enforcement
 +
|-
 +
|National White Collar Crime Center
 +
|http://www.nw3c.org/training
 +
|Limited To Law Enforcement
 +
|-
 +
|}
  
<s>bad idea</s>
+
==Tool Vendor Training==
:: good idea
+
{| border="0" cellpadding="2" cellspacing="2" align="top"
 +
|- style="background:#bfbfbf; font-weight: bold"
 +
! width="40%"|Title
 +
! width="40%"|Website
 +
! width="20%"|Limitation
 +
|-
 +
|AccessData (Forensic Tool Kit FTK)
 +
|http://accessdata.com/training
 +
|-
 +
|ASR Data (SMART)
 +
|http://www.asrdata.com/forensic-training/overview/
 +
|-
 +
|ATC-NY (P2P Marshal, Mac Marshal)
 +
|http://p2pmarshal.atc-nycorp.com/index.php/training http://macmarshal.atc-nycorp.com/index.php/training
 +
|-
 +
|BlackBag Technologies (Mac Forensic Tools- BlackLight and SoftBlock)
 +
|https://www.blackbagtech.com/training.html
 +
|-
 +
|Cellebrite (UFED)
 +
|http://www.cellebrite.com/mobile-forensic-training.html
 +
|-
 +
|CPR Tools (Data Recovery)
 +
|http://www.cprtools.net/training.php
 +
|-
 +
|Digital Intelligence (FRED Forensics Platform)
 +
|http://www.digitalintelligence.com/forensictraining.php
 +
|-
 +
|e-fense, Inc. (Helix3 Pro)
 +
|http://www.e-fense.com/training/index.php
 +
|-
 +
|Forward Discovery (Cellebrite, EnCase, Mac Forensics)
 +
|http://www.forwarddiscovery.com/training
 +
|-
 +
|Guidance Software (EnCase)
 +
|http://www.guidancesoftware.com/computer-forensics-training-courses.htm
 +
|-
 +
|Micro Systemation (XRY)
 +
|http://www.msab.com/training/schedule
 +
|-
 +
|Nuix (eDiscovery)
 +
|http://www.nuix.com.au/training
 +
|-
 +
|Paraben (Paraben Suite)
 +
|http://www.paraben-training.com/schedule.html
 +
|-
 +
|Software Analysis & Forensic Engineering (CodeSuite)
 +
|http://www.safe-corp.biz/training.htm
 +
|-
 +
|Technology Pathways(ProDiscover)
 +
|http://www.techpathways.com/DesktopDefault.aspx?tabindex=6&tabid=9
 +
|-
 +
|Volatility Labs (Volatility Framework)
 +
|http://volatility-labs.blogspot.com/search/label/training
 +
|-
 +
|WetStone Technologies (Gargoyle, Stego Suite, LiveWire Investigator)
 +
|https://www.wetstonetech.com/trainings.html
 +
|-
 +
|X-Ways Forensics (X-Ways Forensics)
 +
|http://www.x-ways.net/training/
 +
|-
 +
|}
  
= License =
+
==Commercial Training (Non-Tool Vendor)==
 
+
{| border="0" cellpadding="2" cellspacing="2" align="top"
BSD-3.
+
|- style="background:#bfbfbf; font-weight: bold"
:: [[User:Joachim Metz|Joachim]] library based validator could need other licenses
+
! width="40%"|Title
 
+
! width="40%"|Website
= OS =
+
! width="20%"|Limitation
 
+
|-
Linux/FreeBSD/MacOS
+
|Applied Security (Digital Forensics Training)
: Shouldn't this just match what the underlying afflib & sleuthkit cover? [[User:RB|RB]]
+
|http://www.appliedsec.com/forensics/training.html
:: Yes, but you need to test and validate on each. Question: Do we want to support windows? [[User:Simsong|Simsong]] 21:09, 30 October 2008 (UTC)
+
|-
:: [[User:Joachim Metz|Joachim]] I think we would do wise to design with windows support from the start this will improve the platform independence from the start
+
|BerlaCorp iOS and GPS Forensics Training
:::: Agreed; I would even settle at first for being able to run against Cygwin.  Note that I don't even own or use a copy of Windows, but the vast majority of forensic investigators do. [[User:RB|RB]] 14:01, 31 October 2008 (UTC)
+
|http://www.berlacorp.com/training.html
 
+
|-
= Name tooling =
+
|Computer Forensic Training Center Online (CFTCO)
 
+
|http://www.cftco.com/
* [[User:Joachim Metz|Joachim]] A name for the tooling I propose coldcut
+
|-
:: How about 'butcher'?  ;)  [[User:RB|RB]] 14:20, 31 October 2008 (UTC)
+
|CCE Bootcamp
 
+
|http://www.cce-bootcamp.com/
= Requirements =
+
|-
 
+
|Cyber Security Academy
[[User:Joachim Metz|Joachim]] Could we do a MoSCoW evaluation of these.
+
|http://www.cybersecurityacademy.com/
 
+
|-
* AFF and EWF file images supported from scratch. ([[User:Joachim Metz|Joachim]] I would like to have raw/split raw and device access as well)
+
|Dera Forensics Group
:: If we base our image i/o on afflib, we get all three with one interface. [[User:RB|RB]]
+
|http://www.deraforensicgroup.com/courses.htm
* [[User:Joachim Metz|Joachim]] volume/partition aware layer (what about carving unpartioned space)
+
|-
* File system aware layer.
+
|e-fense Training
** By default, files are not carved. (clarify: only identified? [[User:RB|RB]]; I guess that it operates like [[Selective file dumper]] [[User:.FUF|.FUF]] 07:00, 29 October 2008 (UTC))
+
|http://www.e-fense.com/training/index.php
* Plug-in architecture for identification/validation.
+
|-
** [[User:Joachim Metz|Joachim]] support for multiple types of validators
+
|Forward Discovery, Inc.
*** dedicated validator
+
|http://www.forwarddiscovery.com
*** validator based on file library (i.e. we could specify/implement a file structure for these)
+
|-
*** configuration based validator (Can handle config files,like Revit07, to enter different file formats used by the carver.)
+
|H-11 Digital Forensics
* Ship with validators for:
+
|http://www.h11-digital-forensics.com/training/viewclasses.php
[[User:Joachim Metz|Joachim]] I think we should distinguish between file format validators and content validators
+
|-
** JPEG
+
|High Tech Crime Institute
** PNG
+
|http://www.gohtci.com
** GIF
+
|-
** MSOLE
+
|Infosec Institute
** ZIP
+
|http://www.infosecinstitute.com/courses/security_training_courses.html
** TAR (gz/bz2)
+
|-
 
+
|Intense School (a subsidiary of Infosec Institute)
[[User:Joachim Metz|Joachim]] For a production carver we need at least the following formats
+
|http://www.intenseschool.com/schedules
** Grapical Images
+
|-
*** JPEG (the 3 different types with JFIF/EXIF support)
+
|MD5 Group (Computer Forensics and E-Discovery courses)(Dallas, TX)
*** PNG
+
|http://www.md5group.com
*** GIF
+
|-
*** BMP
+
|Mile 2 (Security and Forensics Certification Training)
*** TIFF
+
|https://www.mile2.com/mile2-online-estore/classess.html
** Office documents
+
|-
*** OLE2 (Word/Excell content support)
+
|Mobile Forensics, Inc
*** PDF
+
|http://mobileforensicsinc.com/
*** Open Office/Office 2007 (ZIP+XML)
+
|-
** Archive files
+
|NetSecurity
*** ZIP
+
|http://www.netsecurity.com/training/registration_schedule.html
*** 7z
+
|-
*** gzip
+
|NID Forensics Academy (Certified Digital Forensic Investigator - CDFI Program)
*** bzip2
+
|http://www.nidforensics.com.br/
*** tar
+
|-
*** RAR
+
|NTI (an Armor Forensics Company) APPEARS DEFUNCT
** E-mail files
+
|http://www.forensics-intl.com/training.html
*** PFF (PST/OST)
+
|-
*** MBOX (text based format, base64 content support)
+
|Security University
** Audio/Video files
+
|http://www.securityuniversity.net/classes.php
*** MPEG
+
|-
*** MP2/MP3
+
|Steganography Analysis and Research Center (SARC)
*** AVI
+
|http://www.sarc-wv.com/training
*** ASF/WMV
+
|-
*** QuickTime
+
|Sumuri, LLC - Mac, Mobile, iLook Training
*** MKV
+
|http://www.sumuri.com/
** Printer spool files
+
|-
*** EMF (if I remember correctly)
+
|SysAdmin, Audit, Network, Security Institute (SANS)
** Internet history files
+
|http://computer-forensics.sans.org/courses/
*** index.dat
+
|-
*** firefox (sqllite 3)
+
|Teel Technologies Mobile Device Forensics Training
** Other files
+
|http://www.teeltech.com/tt3/training.asp
*** thumbs.db
+
|-
*** pagefile?
+
|viaForensics Advanced Mobile Forensics Training
 
+
|http://viaforensics.com/education/calendar/
* Simple fragment recovery carving using gap carving.
+
|-
** [[User:Joachim Metz|Joachim]] have hook in for more advanced fragment recovery?
+
|Zeidman Consulting (MCLE)
* Recovering of individual ZIP sections and JPEG icons that are not sector aligned.
+
|http://www.zeidmanconsulting.com/speaking.htm
** [[User:Joachim Metz|Joachim]] I would propose a generic fragment detection and recovery
+
|-
* Autonomous operation (some mode of operation should be completely non-interactive, requiring no human intervention to complete [[User:RB|RB]])
+
|}
** [[User:Joachim Metz|Joachim]] as much as possible, but allow to be overwritten by user
+
* Tested on 500GB-sized images. Should be able to carve a 500GB image in roughly 50% longer than it takes to read the image.
+
** Perhaps allocate a percentage budget per-validator (i.e. each validator adds N% to the carving time) [[User:RB|RB]]
+
** [[User:Joachim Metz|Joachim]] have multiple carving phases for precision/speed trade off?
+
* Parallelizable
+
** [[User:Joachim Metz|Joachim]] tunable for different architectures
+
* Configuration:
+
** Capability to parse some existing carvers' configuration files, either on-the-fly or as a one-way converter.
+
** Disengage internal configuration structure from configuration files, create parsers that present the expected structure
+
** [[User:Joachim Metz|Joachim]] The validator should deal with the file structure the carving algorithm should not know anything about the file structure (as in revit07 design)
+
**  Either extend Scalpel/Foremost syntaxes for extended features or use a tertiary syntax ([[User:Joachim Metz|Joachim]] I would prefer a derivative of the revit07 configuration syntax which already has encountered some problems of dealing with defining file structure in a configuration file)
+
* Can output audit.txt file.
+
* [[User:Joachim Metz|Joachim]] Can output database with offset analysis values i.e. for visualization tooling
+
* [[User:Joachim Metz|Joachim]] Can output debug log for debugging the algorithm/validation
+
* Easy integration into ascription software.
+
** [[User:Joachim Metz|Joachim]] I'm no native speaker what do you mean with "ascription software"?
+
:: I think this was another non-native requesting easy scriptability. [[User:RB|RB]] 14:20, 31 October 2008 (UTC)
+
:::: [[User:Joachim Metz|Joachim]] that makes sense ;-)
+
 
+
= Ideas =
+
* Use as much TSK if possible. Don't carry your own FS implementation the way photorec does.
+
** [[User:Joachim Metz|Joachim]] using TSK as much as possible would not allow to add your own file system support (i.e. mobile phones, memory structures, cap files) I would propose wrapping TSK and using it as much as possible but allow to integrate own FS implementations.  
+
* Extracting/carving data from [[Thumbs.db]]? I've used [[foremost]] for it with some success. [[Vinetto]] has some critical bugs :( [[User:.FUF|.FUF]] 19:18, 28 October 2008 (UTC)
+
** [[User:Joachim Metz|Joachim]] this poses an interesting addition to the carver do we want to support (let's call it) 'recursive in file carving' (for now) this is different from embedded files because there is a file system structure in the file and not just another file structure
+
* Carving data structures. For example, extract all TCP headers from image by defining TCP header structure and some fields (e.g. source port > 1024, dest port = 80). This will extract all data matching the pattern and write a file with other fields. Another example is carving INFO2 structures and URL activity records from index.dat [[User:.FUF|.FUF]] 20:51, 28 October 2008 (UTC)
+
** This has the opportunity to be extended to the concept of "point at blob FOO and interpret it as BAR"
+
 
+
== Configuration language/specification ==
+
.FUF added:
+
The main idea is to allow users to define structures, for example (in pascal-like form):
+
 
+
<pre>
+
Field1: Byte = 123;
+
SomeTextLength: DWORD;
+
SomeText: string[SomeTextLength];
+
Field4: Char = 'r';
+
...
+
</pre>
+
 
+
This will produce something like this:
+
<pre>
+
Field1 = 123
+
SomeTextLength = 5
+
SomeText = 'abcd1'
+
Field4 = 'r'
+
</pre>
+
 
+
(In text or raw forms.)
+
 
+
Opinions?
+
 
+
Opinion: Simple pattern identification like that may not suffice, I think Simson's original intent was not only to identify but to allow for validation routines (plugins, as the original wording was). As such, the format syntax would need to implement a large chunk of some programming language in order to be sufficiently flexible. [[User:RB|RB]]
+
 
+
[[User:Joachim Metz|Joachim]]
+
In my option your example is too limited. Making the revit configuration I learned you'll need a near programming language to specify some file formats.
+
A simple descriptive language is too limiting. I would also go for 2 bytes with endianess instead of using terminology like WORD and small integer, it's much more clear. The configuration also needs to deal with aspects like cardinality, required and optional structures.
+
 
+
Please take a look at the revit07 configuration. It's not there yet but goes a far way. Some things currently missing:
+
* bitwise alignment
+
* handling encapsulated streams (MPEG/capture files)
+
* handling content based formats (MBOX)
+
 
+
=Caving algorithm =
+
[[User:Joachim Metz|Joachim]]
+
* should we allow for multiple runs?
+
* should we allow for multiple algorithms?
+
* does the algorithm passes data blocks to the validators?
+
* does a validator need to maintain a state?
+
* does a validator need to revert a state?
+
* do we use the assumption that a data block can be used by a single file (with the exception of embedded/encapsulated files)?
+
 
+
==Caving scenarios ==
+
[[User:Joachim Metz|Joachim]]
+
* normal file (file structure, loose text based structure (more a content structure?))
+
* fragmented file (the file entirely exist)
+
* a file fragment (the file does not entirely exist)
+
* intertwined file
+
* encapsulated file (MPEG/network capture)
+
* embedded file (JPEG thumbnail)
+
* obfuscation ('encrypted' PFF) this also entails encryption and/or compression
+
* file system in file
+
 
+
=File System Awareness =
+
==Background: Why be File System Aware?==
+
Advantages of being FS aware:
+
* You can pick up sector allocation sizes
+
:: [[User:Joachim Metz|Joachim]] do you mean file system block sizes?
+
* Some file systems may store things off sector boundaries. (ReiserFS with tail packing)
+
* Increasingly file systems have compression (NTFS compression)
+
* Carve just the sectors that are not in allocated files.
+
 
+
==Tasks that would be required==
+
 
+
==Discussion==
+
:: As noted above, TSK should be utilized as much as possible, particularly the filesystem-aware portion.  If we want to identify filesystems outside of its supported set, it would be more worth our time to work on implementing them there than in the carver itself.  [[User:RB|RB]]
+
 
+
:::: I guess this tool operates like [[Selective file dumper]] and can recover files in both ways (or not?). Recovering files by using carving can recover files in situations where sleuthkit does nothing (e.g. file on NTFS was deleted using ntfs-3g, or filesystem was destroyed or just unknown). And we should build the list of filesystems supported by carver, not by TSK. [[User:.FUF|.FUF]] 07:08, 29 October 2008 (UTC)
+
 
+
:: This tool is still in the early planning stages (requirements discovery), hence few operational details (like precise modes of operation) have been fleshed out - those will and should come later.  The justification for strictly using TSK for the filesystem-sensitive approach is simple: TSK has good filesystem APIs, and it would be foolish to create yet another standalone, incompatible implementation of filesystem(foo) when time would be better spent improving those in TSK, aiding other methods of analysis as well.  This is the same reason individuals that have implemented several other carvers are participating: de-duplication of effort.  [[User:RB|RB]]
+
 
+
[[User:Joachim Metz|Joachim]] I would like to have the carver (recovery tool) also do recovery using file allocation data or remainders of file allocation data.
+
 
+
[[User:Joachim Metz|Joachim]]
+
I would go as far to ask you all to look beyond the carver as a tool and look from the perspective of the carver as part of the forensic investigation process. In my eyes certain information needed/acquired by the carver could be also very useful investigative information i.e. what part of a hard disk contains empty sectors.
+
 
+
=Supportive tooling=
+
[[User:Joachim Metz|Joachim]]
+
* validator (definitions) tester (detest in revit07)
+
* tool to make configuration based definitions
+
* post carving validation
+
* the carver needs to provide support for fuse mount of carved files (carvfs)
+
 
+
=Testing =
+
[[User:Joachim Metz|Joachim]]
+
* automated testing
+
* test data
+
 
+
=Validator Construction=
+
Options:
+
* Write validators in C/C++
+
** [[User:Joachim Metz|Joachim]] you mean dedicated validators
+
* Have a scripting language for writing them (python? Perl?) our own?
+
** [[User:Joachim Metz|Joachim]] use easy to embed programming languages i.e. Phyton or Lua
+
* Use existing programs (libjpeg?) as plug-in validators?
+
** [[User:Joachim Metz|Joachim]] define a file structure api for this
+
 
+
=Existing Code that we have=
+
[[User:Joachim Metz|Joachim]]
+
Please add any missing links
+
 
+
Documentation/Articles
+
* DFRWS2006/2007 carving challenge results
+
* DFRWS2008 paper on carving
+
 
+
Carvers
+
* DFRWS2006/2007 carving challenge results
+
* photorec (http://www.cgsecurity.org/wiki/PhotoRec)
+
* revit06 and revit07 (http://sourceforge.net/projects/revit/)
+
* s3/scarve
+
 
+
Possible file structure validator libraries
+
* divers existing file support libraries
+
* libole2 (inhouse experimental code of OLE2 support)
+
* libpff (alpha release for PFF (PST/OST) file support) (http://sourceforge.net/projects/libpff/)
+
 
+
Input support
+
* AFF (http://www.afflib.org/)
+
* EWF (http://sourceforge.net/projects/libewf/)
+
* TSK device & raw & split raw (http://www.sleuthkit.org/)
+
 
+
Volume/Partition support
+
* disktype (http://disktype.sourceforge.net/)
+
* testdisk (http://www.cgsecurity.org/wiki/TestDisk)
+
* TSK
+
 
+
File system support
+
* TSK
+
* photorec FS code
+
* implementations of FS in Linux/BSD
+
 
+
Content support
+
 
+
=Implementation Timeline=
+
# gather the available resources/ideas/wishes/needs etc. (I guess we're in this phase)
+
# start discussing a high level design (in terms of algorithm, facilities, information needed)
+
## input formats facility
+
## partition/volume facility
+
## file system facility
+
## file format facility
+
## content facility
+
## how to deal with fragment detection (do the validators allow for fragment detection?)
+
## how to deal with recombination of fragments
+
## do we want multiple carving phases in light of speed/precision tradeoffs
+
# start detailing parts of the design
+
## Discuss options for a grammar driven validator?
+
## Hard-coded plug-ins?
+
## Which existing code can we use?
+
# start building/assembling parts of the tooling for a prototype
+
## Implement simple file carving with validation.
+
## Implement gap carving
+
# Initial Release
+
# Implement the ''threaded carving'' that [[User:.FUF|.FUF]] is describing above.
+
 
+
[[User:Joachim Metz|Joachim]] Shouldn't multi threaded carving (MTC) not be part of the 1st version?
+
The MT approach makes for different design decisions
+

Revision as of 13:25, 13 June 2014

This is the list of Training Providers, who offer training courses of interest to practitioners and researchers in the field of Digital Forensics. Conferences which may include training are located on the Upcoming_events page.

PLEASE READ BEFORE YOU EDIT THE LIST BELOW
Some training providers offer on-going training courses that are available in an on-line "any time" format. Others have regularly scheduled training that is the same time each month. Others have recurring training but are scheduled at various times throughout the year. Providers training courses should be listed in alphabetical order, and should be listed in the appropriate section. Non-Commercial training is typically offered by governmental agencies or organizations that directly support law enforcement. Tool Vendor training is training offered directly by a specific tool vendor, which may apply broadly, but generally is oriented to the vendor's specific tool (or tool suite). Commercial Training is training offered by commercial companies which may or may not be oriented to a specific tool/tool suite, but is offered by a company other than a tool vendor.

Some training opportunities may be limited to Law Enforcement Only or to a specific audience. Such restrictions should be noted when known.

On-going / Continuous Training

Title Date/Location Website
DISTANCE LEARNING
Basic Computer Examiner Course - Computer Forensic Training Online Distance Learning Format http://www.cftco.com
SANS On-Demand Training Distance Learning Format http://www.sans.org/ondemand/?portal=69456f95660ade45be29c00b0c14aea1
Champlain College - CCE Course Online / Distance Learning Format http://online.champlain.edu/computer-forensics-digital-investigation/CFDI_440
National Center for Media Forensics Distance and Concentrated Audio/Video/Image Forensics http://cam.ucdenver.edu/ncmf
RECURRING TRAINING
Evidence Recovery for Windows 7® operating system; First full week every month
Brunswick, GA
http://www.internetcrimes.net
Evidence Recovery for Windows 8® Second full week every month
Brunswick, GA
http://www.internetcrimes.net
Evidence Recovery for Windows Server® 2008 and 2012 Third full week every month
Brunswick, GA
http://www.internetcrimes.net

Non-Commercial Training

Title Website Limitation
Defense Cyber Investigations Training Academy (DCITA) http://www.dc3.mil/dcita/dcitaAbout.php Limited To Certain Roles within US Government Agencies(1)
Federal Law Enforcement Training Center http://www.fletc.gov/training/programs/technical-operations-division Limited To Law Enforcement
MSU National Forensics Training Center http://www.security.cse.msstate.edu/ftc Limited To Law Enforcement
IACIS http://www.iacis.com/training/course_listings Limited To Law Enforcement and Affiliate Members of IACIS
SEARCH http://www.search.org/programs/hightech/courses/ Limited To Law Enforcement
National White Collar Crime Center http://www.nw3c.org/training Limited To Law Enforcement

Tool Vendor Training

Title Website Limitation
AccessData (Forensic Tool Kit FTK) http://accessdata.com/training
ASR Data (SMART) http://www.asrdata.com/forensic-training/overview/
ATC-NY (P2P Marshal, Mac Marshal) http://p2pmarshal.atc-nycorp.com/index.php/training http://macmarshal.atc-nycorp.com/index.php/training
BlackBag Technologies (Mac Forensic Tools- BlackLight and SoftBlock) https://www.blackbagtech.com/training.html
Cellebrite (UFED) http://www.cellebrite.com/mobile-forensic-training.html
CPR Tools (Data Recovery) http://www.cprtools.net/training.php
Digital Intelligence (FRED Forensics Platform) http://www.digitalintelligence.com/forensictraining.php
e-fense, Inc. (Helix3 Pro) http://www.e-fense.com/training/index.php
Forward Discovery (Cellebrite, EnCase, Mac Forensics) http://www.forwarddiscovery.com/training
Guidance Software (EnCase) http://www.guidancesoftware.com/computer-forensics-training-courses.htm
Micro Systemation (XRY) http://www.msab.com/training/schedule
Nuix (eDiscovery) http://www.nuix.com.au/training
Paraben (Paraben Suite) http://www.paraben-training.com/schedule.html
Software Analysis & Forensic Engineering (CodeSuite) http://www.safe-corp.biz/training.htm
Technology Pathways(ProDiscover) http://www.techpathways.com/DesktopDefault.aspx?tabindex=6&tabid=9
Volatility Labs (Volatility Framework) http://volatility-labs.blogspot.com/search/label/training
WetStone Technologies (Gargoyle, Stego Suite, LiveWire Investigator) https://www.wetstonetech.com/trainings.html
X-Ways Forensics (X-Ways Forensics) http://www.x-ways.net/training/

Commercial Training (Non-Tool Vendor)

Title Website Limitation
Applied Security (Digital Forensics Training) http://www.appliedsec.com/forensics/training.html
BerlaCorp iOS and GPS Forensics Training http://www.berlacorp.com/training.html
Computer Forensic Training Center Online (CFTCO) http://www.cftco.com/
CCE Bootcamp http://www.cce-bootcamp.com/
Cyber Security Academy http://www.cybersecurityacademy.com/
Dera Forensics Group http://www.deraforensicgroup.com/courses.htm
e-fense Training http://www.e-fense.com/training/index.php
Forward Discovery, Inc. http://www.forwarddiscovery.com
H-11 Digital Forensics http://www.h11-digital-forensics.com/training/viewclasses.php
High Tech Crime Institute http://www.gohtci.com
Infosec Institute http://www.infosecinstitute.com/courses/security_training_courses.html
Intense School (a subsidiary of Infosec Institute) http://www.intenseschool.com/schedules
MD5 Group (Computer Forensics and E-Discovery courses)(Dallas, TX) http://www.md5group.com
Mile 2 (Security and Forensics Certification Training) https://www.mile2.com/mile2-online-estore/classess.html
Mobile Forensics, Inc http://mobileforensicsinc.com/
NetSecurity http://www.netsecurity.com/training/registration_schedule.html
NID Forensics Academy (Certified Digital Forensic Investigator - CDFI Program) http://www.nidforensics.com.br/
NTI (an Armor Forensics Company) APPEARS DEFUNCT http://www.forensics-intl.com/training.html
Security University http://www.securityuniversity.net/classes.php
Steganography Analysis and Research Center (SARC) http://www.sarc-wv.com/training
Sumuri, LLC - Mac, Mobile, iLook Training http://www.sumuri.com/
SysAdmin, Audit, Network, Security Institute (SANS) http://computer-forensics.sans.org/courses/
Teel Technologies Mobile Device Forensics Training http://www.teeltech.com/tt3/training.asp
viaForensics Advanced Mobile Forensics Training http://viaforensics.com/education/calendar/
Zeidman Consulting (MCLE) http://www.zeidmanconsulting.com/speaking.htm