Difference between pages "Advanced Steganography Demystifying Steganography Investigation" and "Zombies and Botnets: Setup-Investigate-Shutdown"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(New page: '''Live Investigator Training''' [https://www.wetstonetech.com/cgi/shop.cgi?view,7] == == Live Investigator Training is designed to teach students the techniques for acquiring digital...)
 
 
Line 1: Line 1:
'''Live Investigator Training''' [https://www.wetstonetech.com/cgi/shop.cgi?view,7]
+
'''Hacking Bootcamp:  Exploits and Live Incident Investigation''' [http://www.wetstonetech.com/cgi-bin/shop.cgi?view,21]
  
  
==   ==
+
== ==
  
Live Investigator Training is designed to teach students the techniques for acquiring digital evidence from a running suspect’s system in an overt or covert manner. This includes acquiring running process state, open handles, process/port associations, system logs, installed devices, physical and logical drives, network statistics and configuration, user accounts and logged in users.  Class participants will also learn how to acquire volatile memory and/or registry snapshots from the target host. This could include recently used applications and documents, recently visited web sites, chat logs and e-mails. Physical RAM capture may contain vital password and account information, remnants of visited web sites, recent messages, phone numbers, e-mail addresses and chat identities.
+
WetStone has engineered a three-day interactive lab environment that allows each student to experience real investigative  scenarios in a cyber safe environment. WetStone’s multi-pronged approach to this bootcamp allows each student to utilize the latest tools and technologies used by today’s criminals, and to practice the requisite live approach to investigation. This learning environment is the most effective approach to acquiring deep knowledge regarding both the latest threats and to  practice in live investigation techniques and methodologies.
 +
  
  
'''Why Live Investigation?'''
+
'''Unique Cyber-Safe Environment'''
  
As many corporation’s networks are becoming large and often geographically divers, it is imperative to practice a live investigation technique. LiveWire Investigator™ and it’s associated software bundle provides the capability of collecting and analyzing comprehensive information regarding evidence contained on ‘live-running’ devices.
+
WetStone has created a unique virtualized cyber-safe environment where investigators and IT professionals can safely use and experiment with some of the best malicious software and incident response tools including...  
  
 +
▫ Botnets
 +
▫ Rootkits
 +
▫ Sidejacking
 +
▫ Wireless cracking
 +
▫ Live Triage
 +
▫ Memory Analysis
 +
▫ Log Analysis
 +
▫ Process Port Linkage
  
'''Who Should Attend?'''
 
  
▫ Forensic Investigators
+
Students are provided with all tools and a cyber-safe laboratory environment with exercises installed for the lecture and hands-on portions of the class. In addition, all students will receive copies of the lecture and lab exercises and a reference CD. Those sitting for, and passing WetStone's written and practical exam, will receive WetStone Certification.
▫ Local, state and federal law enforcement
+
▫ Private investigators
+
▫ IT security professionals
+
▫ Security auditors
+
  
  
'''Skills Learned'''
 
 
Upon completion of the course, students will have gained knowledge in the fundamentals of investigating a system in it’s running state to include...
 
 
▫ Forensic network discovery
 
▫ Evidence collection process
 
▫ Acquisition of volatile data
 
▫ Automated audit trail
 
▫ Forensic reporting
 
 
Our trainers take you inside the minds of today’s criminals and students completeing the class will be able to execute a full investigation in the respective discipline. Participants proficiency in the above skills will be tested with certification exams.
 
  
  

Revision as of 13:21, 6 October 2009

Hacking Bootcamp: Exploits and Live Incident Investigation [1]


WetStone has engineered a three-day interactive lab environment that allows each student to experience real investigative scenarios in a cyber safe environment. WetStone’s multi-pronged approach to this bootcamp allows each student to utilize the latest tools and technologies used by today’s criminals, and to practice the requisite live approach to investigation. This learning environment is the most effective approach to acquiring deep knowledge regarding both the latest threats and to practice in live investigation techniques and methodologies.


Unique Cyber-Safe Environment

WetStone has created a unique virtualized cyber-safe environment where investigators and IT professionals can safely use and experiment with some of the best malicious software and incident response tools including...

▫ Botnets
▫ Rootkits
▫ Sidejacking
▫ Wireless cracking
▫ Live Triage
▫ Memory Analysis
▫ Log Analysis
▫ Process Port Linkage


Students are provided with all tools and a cyber-safe laboratory environment with exercises installed for the lecture and hands-on portions of the class. In addition, all students will receive copies of the lecture and lab exercises and a reference CD. Those sitting for, and passing WetStone's written and practical exam, will receive WetStone Certification.




Contact Information:

1-877-WETSTONE ext 2

www.wetstonetech.com [2]