Difference between pages "Hacking BootCamp: Exploits and Live Incident Investigation" and "Advanced Steganography Demystifying Steganography Investigation"

From Forensics Wiki
(Difference between pages)
Jump to: navigation, search
 
(New page: '''Live Investigator Training''' [https://www.wetstonetech.com/cgi/shop.cgi?view,7] == == Live Investigator Training is designed to teach students the techniques for acquiring digital...)
 
Line 1: Line 1:
'''Hacking BootCamp:  Exploits and Live Incident Investigation''' [http://www.wetstonetech.com/cgi-bin/shop.cgi?view,21]
+
'''Live Investigator Training''' [https://www.wetstonetech.com/cgi/shop.cgi?view,7]
  
  
 
==  ==
 
==  ==
  
WetStone has engineered a three-day interactive lab environment that allows each student to experience real investigative  scenarios in a cyber safe environment. WetStone’s multi-pronged approach to this bootcamp allows each student to utilize the latest tools and technologies used by today’s criminals, and to practice the requisite live approach to investigation. This learning environment is the most effective approach to acquiring deep knowledge regarding both the latest threats and to  practice in live investigation techniques and methodologies.
+
Live Investigator Training is designed to teach students the techniques for acquiring digital evidence from a running suspect’s system in an overt or covert manner. This includes acquiring running process state, open handles, process/port associations, system logs, installed devices, physical and logical drives, network statistics and configuration, user accounts and logged in users.  Class participants will also learn how to acquire volatile memory and/or registry snapshots from the target host. This could include recently used applications and documents, recently visited web sites, chat logs and e-mails. Physical RAM capture may contain vital password and account information, remnants of visited web sites, recent messages, phone numbers, e-mail addresses and chat identities.
 
+
  
'''Classroom Environment'''
 
  
WetStone has created a unique virtualized cyber-safe environment where investigator and IT professionals can use and experiment with some of the best ... 
+
'''Why Live Investigation?'''
 
+
▫ Botnet      
+
▫ Rootkit      
+
▫ Wireless Cracking      
+
Live Triage             
+
▫ Memory Analysis      
+
▫ Live Triage             
+
▫ Memory Analysis
+
▫ Log Analysis
+
▫ Process Port Linkage
+
  
 +
As many corporation’s networks are becoming large and often geographically divers, it is imperative to practice a live investigation technique. LiveWire Investigator™ and it’s associated software bundle provides the capability of collecting and analyzing comprehensive information regarding evidence contained on ‘live-running’ devices.
 +
 +
 +
'''Who Should Attend?'''
 +
 +
▫ Forensic Investigators
 +
▫ Local, state and federal law enforcement
 +
▫ Private investigators
 +
▫ IT security professionals
 +
▫ Security auditors
 +
 +
 +
'''Skills Learned'''
 +
 +
Upon completion of the course, students will have gained knowledge in the fundamentals of investigating a system in it’s running state to include...
 +
 +
▫ Forensic network discovery
 +
▫ Evidence collection process
 +
▫ Acquisition of volatile data
 +
▫ Automated audit trail
 +
▫ Forensic reporting
  
 
Our trainers take you inside the minds of today’s criminals and students completeing the class will be able to execute a full investigation in the respective discipline. Participants proficiency in the above skills will be tested with certification exams.
 
Our trainers take you inside the minds of today’s criminals and students completeing the class will be able to execute a full investigation in the respective discipline. Participants proficiency in the above skills will be tested with certification exams.
Line 29: Line 38:
 
'''Contact Information:'''
 
'''Contact Information:'''
  
1-877-WETSTONE ext. 2
+
1-877-WETSTONE ext 2
  
 
www.wetstonetech.com [https://www.wetstonetech.com/index.html]
 
www.wetstonetech.com [https://www.wetstonetech.com/index.html]

Revision as of 09:54, 13 June 2008

Live Investigator Training [1]


Live Investigator Training is designed to teach students the techniques for acquiring digital evidence from a running suspect’s system in an overt or covert manner. This includes acquiring running process state, open handles, process/port associations, system logs, installed devices, physical and logical drives, network statistics and configuration, user accounts and logged in users. Class participants will also learn how to acquire volatile memory and/or registry snapshots from the target host. This could include recently used applications and documents, recently visited web sites, chat logs and e-mails. Physical RAM capture may contain vital password and account information, remnants of visited web sites, recent messages, phone numbers, e-mail addresses and chat identities.


Why Live Investigation?

As many corporation’s networks are becoming large and often geographically divers, it is imperative to practice a live investigation technique. LiveWire Investigator™ and it’s associated software bundle provides the capability of collecting and analyzing comprehensive information regarding evidence contained on ‘live-running’ devices.


Who Should Attend?

▫ Forensic Investigators
▫ Local, state and federal law enforcement
▫ Private investigators
▫ IT security professionals
▫ Security auditors


Skills Learned

Upon completion of the course, students will have gained knowledge in the fundamentals of investigating a system in it’s running state to include...

▫ Forensic network discovery
▫ Evidence collection process
▫ Acquisition of volatile data
▫ Automated audit trail
▫ Forensic reporting

Our trainers take you inside the minds of today’s criminals and students completeing the class will be able to execute a full investigation in the respective discipline. Participants proficiency in the above skills will be tested with certification exams.



Contact Information:

1-877-WETSTONE ext 2

www.wetstonetech.com [2]