Difference between revisions of "Hacking BootCamp: Exploits and Live Incident Investigation"

From ForensicsWiki
Jump to: navigation, search
(New page: '''Hacking BootCamp for Investigators''' [https://www.wetstonetech.com/cgi/shop.cgi?view,13] == == Hacking BootCamp for Investigators is designed for those responsible for cyber crime...)
 
Line 1: Line 1:
'''Hacking BootCamp for Investigators''' [https://www.wetstonetech.com/cgi/shop.cgi?view,13]
+
'''Hacking BootCamp:  Exploits and Live Incident Investigation''' [http://www.wetstonetech.com/cgi-bin/shop.cgi?view,21]
  
  
 
==  ==
 
==  ==
  
Hacking BootCamp for Investigators is designed for those responsible for cyber crime investigation who must posses a breadth of knowledge regarding the latest technologies, techniques and methodologies in use by cyber criminals. The most effective approach to get into the mind of cyber criminals is to utilize their tools and technologies in a hands-on environment and become familiar with the fundamental hacking process. This four day course is structured with interactive lab environments to allow students to work together and experience real investigative scenarios.  Learn how to become the lead investigator in your office and learn to stay one step ahead of the criminals.
+
WetStone has engineered a three-day interactive lab environment that allows each student to experience real investigative  scenarios in a cyber safe environment. WetStone’s multi-pronged approach to this bootcamp allows each student to utilize the latest tools and technologies used by today’s criminals, and to practice the requisite live approach to investigation. This learning environment is the most effective approach to acquiring deep knowledge regarding both the latest threats and to   practice in live investigation techniques and methodologies.
 +
 
  
 
'''Classroom Environment'''
 
'''Classroom Environment'''
Line 10: Line 11:
 
WetStone has created a unique virtualized cyber-safe environment where investigator and IT professionals can use and experiment with some of the best ...   
 
WetStone has created a unique virtualized cyber-safe environment where investigator and IT professionals can use and experiment with some of the best ...   
 
    
 
    
  ▫ Botnet       ▫ Password Cracking
+
  ▫ Botnet        
  ▫ Rootkit       ▫ Trojan
+
Rootkit      
  ▫ WORM Developing       ▫ Phishing
+
  ▫ Wireless Cracking        
  ▫ Cracking       ▫ Wireless Surveillance
+
Live Triage             
  ▫ Steganography              ▫ Sidejacking
+
  ▫ Memory Analysis        
  ▫ AntiForensic Tool       ▫ Denial of Service
+
Live Triage             
 
+
  ▫ Memory Analysis
This unique real time environment provides investigators with direct access and experience with both the cyber weapons and the latest investigation techniques to uncover nefarious activities quickly and efficiently.
+
  ▫ Log Analysis
 
+
  ▫ Process Port Linkage
 
+
'''Skills Learned'''
+
 
+
Upon completion of the course, students will have gained knowledge in the fundamentals of malicious software as it pertains to the hacking process.
+
  
▫ Offensive planning and execution of cyber weapons
 
▫ Investigative tools and techniques
 
▫ Cyber weapon identification
 
▫ Evidence extraction
 
▫ Malicious software analysis using Gargoyle Investigator™
 
  
 
Our trainers take you inside the minds of today’s criminals and students completeing the class will be able to execute a full investigation in the respective discipline. Participants proficiency in the above skills will be tested with certification exams.
 
Our trainers take you inside the minds of today’s criminals and students completeing the class will be able to execute a full investigation in the respective discipline. Participants proficiency in the above skills will be tested with certification exams.

Revision as of 13:41, 6 October 2009

Hacking BootCamp: Exploits and Live Incident Investigation [1]


WetStone has engineered a three-day interactive lab environment that allows each student to experience real investigative scenarios in a cyber safe environment. WetStone’s multi-pronged approach to this bootcamp allows each student to utilize the latest tools and technologies used by today’s criminals, and to practice the requisite live approach to investigation. This learning environment is the most effective approach to acquiring deep knowledge regarding both the latest threats and to practice in live investigation techniques and methodologies.


Classroom Environment

WetStone has created a unique virtualized cyber-safe environment where investigator and IT professionals can use and experiment with some of the best ...

▫ Botnet		      
▫ Rootkit		       
▫ Wireless Cracking		      
▫ Live Triage              
▫ Memory Analysis	      
▫ Live Triage              
▫ Memory Analysis
▫ Log Analysis
▫ Process Port Linkage


Our trainers take you inside the minds of today’s criminals and students completeing the class will be able to execute a full investigation in the respective discipline. Participants proficiency in the above skills will be tested with certification exams.



Contact Information:

1-877-WETSTONE ext. 2

www.wetstonetech.com [2]