Advanced Steganography Demystifying Steganography Investigation
Live Investigator Training 
Live Investigator Training is designed to teach students the techniques for acquiring digital evidence from a running suspect’s system in an overt or covert manner. This includes acquiring running process state, open handles, process/port associations, system logs, installed devices, physical and logical drives, network statistics and configuration, user accounts and logged in users. Class participants will also learn how to acquire volatile memory and/or registry snapshots from the target host. This could include recently used applications and documents, recently visited web sites, chat logs and e-mails. Physical RAM capture may contain vital password and account information, remnants of visited web sites, recent messages, phone numbers, e-mail addresses and chat identities.
Why Live Investigation?
As many corporation’s networks are becoming large and often geographically divers, it is imperative to practice a live investigation technique. LiveWire Investigator™ and it’s associated software bundle provides the capability of collecting and analyzing comprehensive information regarding evidence contained on ‘live-running’ devices.
Who Should Attend?
▫ Forensic Investigators ▫ Local, state and federal law enforcement ▫ Private investigators ▫ IT security professionals ▫ Security auditors
Upon completion of the course, students will have gained knowledge in the fundamentals of investigating a system in it’s running state to include...
▫ Forensic network discovery ▫ Evidence collection process ▫ Acquisition of volatile data ▫ Automated audit trail ▫ Forensic reporting
Our trainers take you inside the minds of today’s criminals and students completeing the class will be able to execute a full investigation in the respective discipline. Participants proficiency in the above skills will be tested with certification exams.
1-877-WETSTONE ext 2