Difference between pages "File Vault" and "Hacking BootCamp: Exploits and Live Incident Investigation"

From Forensics Wiki
(Difference between pages)
Jump to: navigation, search
m
 
 
Line 1: Line 1:
File Vault is the cryptographic file system developed by [http://www.apple.com Apple] and introduced with MacOS 10.3.
+
'''Hacking BootCamp:  Exploits and Live Incident Investigation''' [http://www.wetstonetech.com/cgi-bin/shop.cgi?view,21]
  
File Vault works by storing each user's home directory in an encrypted ".sparseimage" file. The file is automatically mounted when the user logs in and unmounted when the user logs out. All of the user's files and preferences are stored in this file.  The file's encryption key is stored in the .sparseimage file, but that encryption key is itself encrypted with the user's login password.
 
  
There are no known attacks against File Vault other than a brute force attack on the user's password.
+
==  ==
 +
 
 +
WetStone has engineered a three-day interactive lab environment that allows each student to experience real investigative  scenarios in a cyber safe environment. WetStone’s multi-pronged approach to this bootcamp allows each student to utilize the latest tools and technologies used by today’s criminals, and to practice the requisite live approach to investigation. This learning environment is the most effective approach to acquiring deep knowledge regarding both the latest threats and to  practice in live investigation techniques and methodologies.
 +
 
 +
 
 +
'''Classroom Environment'''
 +
 
 +
WetStone has created a unique virtualized cyber-safe environment where investigator and IT professionals can use and experiment with some of the best ... 
 +
 
 +
▫ Botnet      
 +
▫ Rootkit      
 +
▫ Wireless Cracking      
 +
▫ Live Triage             
 +
▫ Memory Analysis      
 +
▫ Live Triage             
 +
▫ Memory Analysis
 +
▫ Log Analysis
 +
▫ Process Port Linkage
 +
 
 +
 
 +
Our trainers take you inside the minds of today’s criminals and students completeing the class will be able to execute a full investigation in the respective discipline. Participants proficiency in the above skills will be tested with certification exams.
 +
 
 +
 
 +
----
 +
 
 +
'''Contact Information:'''
 +
 
 +
1-877-WETSTONE ext. 2
 +
 
 +
www.wetstonetech.com [https://www.wetstonetech.com/index.html]

Latest revision as of 13:42, 6 October 2009

Hacking BootCamp: Exploits and Live Incident Investigation [1]


WetStone has engineered a three-day interactive lab environment that allows each student to experience real investigative scenarios in a cyber safe environment. WetStone’s multi-pronged approach to this bootcamp allows each student to utilize the latest tools and technologies used by today’s criminals, and to practice the requisite live approach to investigation. This learning environment is the most effective approach to acquiring deep knowledge regarding both the latest threats and to practice in live investigation techniques and methodologies.


Classroom Environment

WetStone has created a unique virtualized cyber-safe environment where investigator and IT professionals can use and experiment with some of the best ...

▫ Botnet		      
▫ Rootkit		       
▫ Wireless Cracking		      
▫ Live Triage              
▫ Memory Analysis	      
▫ Live Triage              
▫ Memory Analysis
▫ Log Analysis
▫ Process Port Linkage


Our trainers take you inside the minds of today’s criminals and students completeing the class will be able to execute a full investigation in the respective discipline. Participants proficiency in the above skills will be tested with certification exams.



Contact Information:

1-877-WETSTONE ext. 2

www.wetstonetech.com [2]