Difference between pages "Training Courses and Providers" and "VPN"

From Forensics Wiki
(Difference between pages)
Jump to: navigation, search
m
 
m
 
Line 1: Line 1:
This is the list of Scheduled Training Courses, referred to by [[Upcoming_events]]. 
+
{{expand}}
  
<b>PLEASE READ BEFORE YOU EDIT THE LIST BELOW</b><br>
+
'''VPN''' (Virtual Private Network) is a class of technology that allows remote machines to interconnect by creating a virtual network layer, on top of the physical network connection, that in practice is used to maintain the privacy of data shared over this virtual network connection (essentially all VPN toolsets use some form of packet-level [[encryption]]). There are many different modern implementations of the VPN concept itself, to the point where categorizing them together becomes somewhat questionable.  
Events should be posted in date order.  An event should NEVER be listed in more than one section (i.e. Ongoing/Continuous events should not be listed in Scheduled Training).  When events begin the same day, events of a longer length should be listed first.  New postings of events with the same date(s) as other events should be added after events already in the list. If a provider offers the same event at several locations simultaneously, the listing should have a single (ONE) entry in the list with the date(s) and ALL locations for the event. Please use three-letter month abbreviations (i.e. Sep, NOT Sept. or September), use two digit dates (i.e. Jan 01 NOT Jan 1), and use date ranges rather than listing every date during an event(i.e. Jan 02-05, NOT Jan 02, 03, 04, 05).<br>
+
<i>Some training opportunities may be <u>limited</u> to <b>Law Enforcement Only</b> or to a specific audience.  Such restrictions should be noted when known.</i>
+
  
The Conference and Training List is provided by the American Academy of Forensic Sciences (AAFS) Digital and Multi-media Listserv. 
+
== Overview ==
<i> (Subscribe by sending an email to listserv@lists.mitre.org with message body containing SUBSCRIBE AAFS-DIGITAL-MULTIMEDIA-LIST)</i>
+
Requests for additions, deletions or corrections to this list may be sent by email to David Baker <i>(bakerd AT mitre.org)</i>.
+
  
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
Virtual Private Networks are deployed by organizations and individuals for different purposes:
|- style="background:#bfbfbf; font-weight: bold"
+
 
! Title
+
* Protecting confidential information in organizations (for example, when connecting geographically distant office networks);
! Date/Location
+
* Providing "work from home" or traveling employees with secure remote access to office network resources;
! Website
+
* Securing general Internet traffic in particularly insecure network usage settings (e.g. open wireless networks);
! Limitation
+
* Encrypting all internet traffic to and from a home connection, to prevent ISP packet shaping and/or surveillance (i.e. [http://www.torrentfreedom.net Torrentfreedom Privacy]).
|-
+
 
|BlackBag Introductory MacIntosh Forensics
+
When used for Internet connectivity, VPN service also acts as a form of proxy and protects the user's real IP address from public display. As a result, they are an increasingly popular form of anonymity protection for ordinary internet users and criminals.
|Oct 06-10, Los Angeles, CA
+
 
|http://www.blackbagtech.com/products/training.htm
+
== VPNs and anonymity ==
|-
+
 
|X-Ways Forensics
+
* Log files: VPN services may maintain usage logs which could then be used to track the activities of the user of those services, after the fact. However some commercial consumer-oriented VPN services specifically configure their servers not to retain any logfile information of this type. An example is [[Cryptocloud VPN]].
|Oct 07-09, London, UK
+
 
|http://www.x-ways.net/training/london.html
+
* Protocol stack: [[TCP timestamps]] and IP ID values may be used in correlating incoming (encrypted) and outgoing (unencrypted) network streams. This type of "traffic analysis" can, in theory, be used to gather information about a fully-encrypted VPN connection - in practice, there are no known public examples of traffic analysis being used against commercial VPN service providers.
|-
+
 
|AccessData&reg; Windows Forensics
+
== See Also ==
|Oct 07-09, Las Vegas, NV and New York City, NY
+
 
|http://www.accessdata.com/common/pagedetail.aspx?PageCode=train
+
* [[Cryptocloud VPN]]
|-
+
* [[Tor]]
|WetStone- Steganography Investigator Training
+
* [[Proxy server]]
|Oct 13-14, The Netherlands ENFSC Conference
+
 
|https://www.wetstonetech.com/trainings.html
+
[[Category:Anti-Forensics]]
|-
+
[[Category:Network Forensics]]
|AccessData&reg; BootCamp
+
[[Category:Encryption]]
|Oct 14-16, Louisville, KY
+
|http://www.accessdata.com/common/pagedetail.aspx?PageCode=train
+
|Limited to Law Enforcement
+
|-
+
|WetStone- Live Investigator Training
+
|Oct 18-19, Atlantic City, NJ HTCIA Conference
+
|https://www.wetstonetech.com/trainings.html
+
|-
+
|Computer Hacking Forensic Investigator CHFI Prep/QFE Qualified Forensics Expert
+
|Oct 20-24, Reston, VA
+
|http://www.securityuniversity.net/classes_CHFI_QFE.php
+
|-
+
|Interpol "Train-the-Trainer" Workshop on Computer Forensics
+
|Oct 20-24, Hong Kong Police College
+
|http://training.tcd.hk
+
|Limited to Law Enforcement
+
|-
+
|Windows NT Operating System(NTOS)
+
|Oct 20-23, St. Louis, MO
+
|http://www.nw3c.org/ocr/courses_desc.cfm
+
|Limited to Law Enforcement
+
|-
+
|EnCase&reg; v6 Computer Forensics II
+
|Oct 21-24, Toronto, Canada
+
|http://www.guidancesoftware.com/training/course_schedule.aspx
+
|-
+
|AccessData&reg; Applied Decryption
+
|Oct 23-25, Sterling, VA
+
|http://guest.cvent.com/EVENTS/Info/Summary.aspx?e=ab0c756b-3cf8-4161-8a70-0c11c6f018fc
+
|-
+
|SARC - Certified Steganography Examiner Training
+
|Oct 23-24, Gaithersburg, MD
+
|http://www.sarc-wv.com/training/training_gaithersburg.aspx
+
|-
+
|WetStone- Live Investigator Training
+
|Oct 24-25, Gaithersburg, MD Techno Forensics Conference
+
|https://www.wetstonetech.com/trainings.html
+
|-
+
|WetStone- Steganography Investigator Training
+
|Oct 24-25, Gaithersburg, MD Techno Forensics Conference
+
|https://www.wetstonetech.com/trainings.html
+
|-
+
|X-Ways Forensics (3 days), File Systems Revealed (2 days)
+
|Oct 27-31, Canberra, Australia
+
|http://www.x-ways.net/training/
+
|Limited to Law Enforcement/Government
+
|-
+
|EnCase&reg; v6 EnScript&reg;  Programming - Phase I
+
|Oct 28-31, Toronto, Canada
+
|http://www.guidancesoftware.com/training/course_schedule.aspx
+
|-
+
|AccessData&reg; Windows Forensics
+
|Oct 28-30, Manchester, United Kingdom
+
|http://www.accessdata.com/common/pagedetail.aspx?PageCode=train
+
|-
+
|Qualified Network Security Policy Admin and SOA Security Oriented Architect 
+
|Nov 03-07, Reston, VA
+
|http://www.securityuniversity.net/classes_policy_SOA.php
+
|-
+
|Q/PTL Qualified Penetration Tester License and LPT Prep
+
|Nov 03-07, Reston, VA
+
|http://www.securityuniversity.net/classes_LPT_QPTL.php
+
|-
+
|Q/SA Qualified Security Analyst Penetration Tester ECSA Prep
+
|Nov 03-07, Reston, VA
+
|http://www.securityuniversity.net/classes_ECSA_QSA.php
+
|-
+
|X-Ways Forensics
+
|Nov 03-05, Sydney, Australia
+
|http://www.x-ways.net/training/sydney.html
+
|-
+
|Macintosh Forensic Survival Course (MFSC)  
+
|Nov 03-07, Bern, Switzerland
+
|http://www.forwarddiscovery.com/shop/index.php?act=viewCat&catId=3
+
|-
+
|Windows NT File System(NTFS)
+
|Nov 03-06, Meriden, CT
+
|http://www.nw3c.org/ocr/courses_desc.cfm
+
|Limited to Law Enforcement
+
|-
+
|EnCase&reg; v6 Computer Forensics II
+
|Nov 04-07, Toronto, Canada
+
|http://www.guidancesoftware.com/training/course_schedule.aspx
+
|-
+
|AccessData&reg; BootCamp
+
|Nov 04-06, London, United Kingdom
+
|http://www.accessdata.com/common/pagedetail.aspx?PageCode=train
+
|-
+
|AccessData&reg; Internet Forensics
+
|Nov 04-06, St Paul, MN
+
|http://www.accessdata.com/common/pagedetail.aspx?PageCode=train
+
|-
+
|AccessData&reg; Windows Forensics
+
|Nov 04-06, Albany, NY
+
|http://www.accessdata.com/common/pagedetail.aspx?PageCode=train
+
|-
+
|Catching the Hackers Intro to IDS
+
|Nov 10-14, Reston, VA
+
|http://www.securityuniversity.net/classes_introIDS.php
+
|-
+
|Catching The Hackers II: Systems to Monitor Your Network
+
|Nov 10-14, Reston, VA
+
|http://www.securityuniversity.net/classes_IDSII.php
+
|-
+
|Q/SSE Qualified Software Security Expert 5-day Bootcamp
+
|Nov 10-14, Reston, VA
+
|http://www.securityuniversity.net/classes_SI_SoftwareSecurity_Bootcamp.php
+
|-
+
|Q/EP Qualified Edge Protection: Black Belt
+
|Nov 10-14, Reston, VA
+
|http://www.securityuniversity.net/classes_QEP.php
+
|-
+
|X-Ways Forensics
+
|Nov 11-13, Hong Kong
+
|http://www.x-ways.net/training/hong_kong.html
+
|-
+
|WetStone- Steganography Investigator Training
+
|Nov 11-12, Fairfax, VA
+
|https://www.wetstonetech.com/trainings.html
+
|-
+
|Security Plus
+
|Nov 17-21, Reston VA Andrews AFB
+
|http://www.securityuniversity.net/classes_Security+.php
+
|-
+
|BlackBag Intermediate MacIntosh Forensics
+
|Nov 17-21, Washington D.C.
+
|http://www.blackbagtech.com/products/training.htm
+
|-
+
|Qualified Security Awareness Class for MGT
+
|Nov 18, Reston VA
+
|http://www.securityuniversity.net/classes_areUprotected_MGT.php
+
|-
+
|WetStone- Hacking BootCamp for Investigators
+
|Nov 18-21, Vancouver BC
+
|https://www.wetstonetech.com/trainings.html
+
|-
+
|EnCase&reg; v6 Network Intrusion Investigations - Phase I
+
|Nov 18-21, Toronto, Canada
+
|http://www.guidancesoftware.com/training/course_schedule.aspx
+
|-
+
|Qualified Security Awareness Training
+
|Nov 19, Reston VA
+
|http://www.securityuniversity.net/classes_areUprotected.php
+
|-
+
|EnCase&reg; v6 Computer Forensics II
+
|Nov 25-28, Toronto, Canada
+
|http://www.guidancesoftware.com/training/course_schedule.aspx
+
|-
+
|AccessData&reg; Internet Forensics
+
|Nov 25-27, Manchester, United Kingdom
+
|http://www.accessdata.com/common/pagedetail.aspx?PageCode=train
+
|-
+
|BlackBag Intermediate MacIntosh Forensics
+
|Dec 01-05, San Diego, CA
+
|http://www.blackbagtech.com/products/training.htm
+
|-
+
|Windows Internet Trace Evidence(INET)
+
|Dec 01-05, St. Louis, MO
+
|http://www.nw3c.org/ocr/courses_desc.cfm
+
|Limited to Law Enforcement
+
|-
+
|Q/WAD Qualified Wireless Analyst and Defender
+
|Dec 01-05, Reston VA
+
|http://www.securityuniversity.net/classes_wireless_QWAD.php
+
|-
+
|Security Plus
+
|Dec 01-05, Reston VA
+
|http://www.securityuniversity.net/classes_Security+.php
+
|-
+
|SSCP Systems Security Certified Practitioner and Security Plus
+
|Dec 01-05, Reston VA
+
|http://www.securityuniversity.net/classes_SSCP.php
+
|-
+
|CWNA Certified Wireless Network Admin/ CWSP Certified Wireless Security Professional Boot Camp
+
|Dec 02-11, San Francisco, CA
+
|http://www.securityuniversity.net/classes_wireless_bootcamp.php
+
|-
+
|AccessData&reg; Windows Forensics
+
|Dec 02-04, Ft Lauderdale, FL; New York City, NY; and London, United Kingdom
+
|http://www.accessdata.com/common/pagedetail.aspx?PageCode=train
+
|-
+
|Fundamentals of Computer Forensics Imaging
+
|Dec 02-05, Falls Church, VA
+
|http://www.mantech.com/msma/isso.asp
+
|-
+
|SC World Congress 2008 - Q/PTL Qualified/ Penetration Tester License 
+
|Dec 05-08, New York City
+
|http://www.securityuniversity.net/classes_LPT_QPTL.php
+
|-
+
|SC World Congress 2008 - Q/SA Qualified/ Security Analyst Penetration Tester (ECSA Prep)
+
|Dec 05-08, New York City
+
|http://www.securityuniversity.net/classes_LPT_QPTL.php
+
|-
+
|SC World Congress 2008 - Q/EH Qualified Ethical Hacker (CEH Prep) Class
+
|Dec 05-08, New York City
+
|http://www.securityuniversity.net/classes_LPT_QPTL.php
+
|-
+
|CWSP Certified Wireless Security Professional
+
|Dec 08-11, San Francisco, CA
+
|http://www.securityuniversity.net/classes_wireless_CWSP.php
+
|-
+
|Computer Hacking Forensic Investigator CHFI Prep/QFE Qualified Forensics Expert
+
|Dec 08-12, Reston, VA
+
|http://www.securityuniversity.net/classes_CEH_QEH.php
+
|-
+
|Windows NT Operating System(NTOS)
+
|Dec 08-11, Meriden, CT
+
|http://www.nw3c.org/ocr/courses_desc.cfm
+
|Limited to Law Enforcement
+
|-
+
|Application Forensics Course
+
|Dec 08-19, Hong Kong Police College
+
|http://www.police.gov.hk/police/policecollege/english/pdl/pold.htm
+
|Limited to Law Enforcement
+
|-
+
|EnCase&reg; v6 Computer Forensics II
+
|Dec 09-12, Toronto, Canada
+
|http://www.guidancesoftware.com/training/course_schedule.aspx
+
|-
+
|AccessData&reg; Internet Forensics
+
|Dec 09-11, Dallas, TX and New York City, NY
+
|http://www.accessdata.com/common/pagedetail.aspx?PageCode=train
+
|-
+
|AccessData&reg; Windows Forensics
+
|Dec 09-11, Louisville, KY
+
|http://www.accessdata.com/common/pagedetail.aspx?PageCode=train
+
|Limited to Law Enforcement
+
|-
+
|EnCase&reg; v6 Advanced Computer Forensics
+
|Dec 16-19, Toronto, Canada
+
|http://www.guidancesoftware.com/training/course_schedule.aspx
+
|-
+
|AccessData&reg; BootCamp
+
|Dec 16-18, Manchester, United Kingdom
+
|http://www.accessdata.com/common/pagedetail.aspx?PageCode=train
+
|-
+
|**__2009 EVENTS__**
+
|_______2009_______
+
|-
+
|Q/EH Qualified Ethical Hacker Class CEH Prep
+
|Jan 12-16, Reston, VA
+
|http://www.securityuniversity.net/classes_CEH_QEH.php
+
|-
+
|SSCP Systems Security Certified Practitioner and Security Plus
+
|Jan 12-16, San Francisco, CA
+
|http://www.securityuniversity.net/classes_%20SSCP_Security+_Bootcamp.php
+
|-
+
|Security Plus
+
|Jan 12-16, Reston, CA
+
|http://www.securityuniversity.net/classes_%20SSCP_Security+_Bootcamp.php
+
|-
+
|Linux File System for Computer Forensic Examiners(Linux)
+
|Jan 12-16, 2009, St. Louis, MO
+
|http://www.nw3c.org/ocr/courses_desc.cfm
+
|Limited to Law Enforcement
+
|-
+
|Q/EP Qualified Edge Protection: Black Belt
+
|Jan 18-22, Reston, CA
+
|http://www.securityuniversity.net/classes_QEP.php
+
|-
+
|Q/SSE Qualified Software Security Expert 5 day Bootcamp
+
|Jan 19-23, Reston, CA
+
|http://www.securityuniversity.net/classes_SI_SoftwareSecurity_Bootcamp.php
+
|-
+
|Windows Internet Trace Evidence(INET)
+
|Jan 19-23, 2009, Meriden, CT
+
|http://www.nw3c.org/ocr/courses_desc.cfm
+
|Limited to Law Enforcement
+
|-
+
|Q/SA Qualified Security Analyst Penetration Tester ECSA Prep
+
|Jan 26-30, Reston, VA
+
|http://www.securityuniversity.net/classes_ECSA_QSA.php
+
|-
+
|Q/PTL Qualified Penetration Tester License and LPT Prep
+
|Jan 26-30, Reston, VA
+
|http://www.securityuniversity.net/classes_LPT_QPTL.php
+
|-
+
|CWNA Certified Wireless Network Admin/ CWSP Certified Wireless Security Professional Boot Camp
+
|Jan 27-Feb 05, Reston, VA
+
|http://www.securityuniversity.net/classes_wireless_bootcamp.php
+
|-
+
|Linux File System for Computer Forensic Examiners(Linux)
+
|Mar 02-06, 2009, Meriden, CT
+
|http://www.nw3c.org/ocr/courses_desc.cfm
+
|Limited to Law Enforcement
+
|-
+
|}
+

Revision as of 13:07, 1 September 2009

Information icon.png

Please help to improve this article by expanding it.
Further information might be found on the discussion page.

VPN (Virtual Private Network) is a class of technology that allows remote machines to interconnect by creating a virtual network layer, on top of the physical network connection, that in practice is used to maintain the privacy of data shared over this virtual network connection (essentially all VPN toolsets use some form of packet-level encryption). There are many different modern implementations of the VPN concept itself, to the point where categorizing them together becomes somewhat questionable.

Overview

Virtual Private Networks are deployed by organizations and individuals for different purposes:

  • Protecting confidential information in organizations (for example, when connecting geographically distant office networks);
  • Providing "work from home" or traveling employees with secure remote access to office network resources;
  • Securing general Internet traffic in particularly insecure network usage settings (e.g. open wireless networks);
  • Encrypting all internet traffic to and from a home connection, to prevent ISP packet shaping and/or surveillance (i.e. Torrentfreedom Privacy).

When used for Internet connectivity, VPN service also acts as a form of proxy and protects the user's real IP address from public display. As a result, they are an increasingly popular form of anonymity protection for ordinary internet users and criminals.

VPNs and anonymity

  • Log files: VPN services may maintain usage logs which could then be used to track the activities of the user of those services, after the fact. However some commercial consumer-oriented VPN services specifically configure their servers not to retain any logfile information of this type. An example is Cryptocloud VPN.
  • Protocol stack: TCP timestamps and IP ID values may be used in correlating incoming (encrypted) and outgoing (unencrypted) network streams. This type of "traffic analysis" can, in theory, be used to gather information about a fully-encrypted VPN connection - in practice, there are no known public examples of traffic analysis being used against commercial VPN service providers.

See Also