Difference between revisions of "Zombies and Botnets: Setup-Investigate-Shutdown"

From Forensics Wiki
Jump to: navigation, search
(New page: '''Steganography Investigator Training''' [https://www.wetstonetech.com/cgi/shop.cgi?view,6] == == Steganography Investigator Training is an intense two-day course designed to provide ...)
 
Line 1: Line 1:
'''Steganography Investigator Training''' [https://www.wetstonetech.com/cgi/shop.cgi?view,6]
+
'''Hacking Bootcamp:  Exploits and Live Incident Investigation''' [http://www.wetstonetech.com/cgi-bin/shop.cgi?view,21]
  
  
 
==  ==
 
==  ==
  
Steganography Investigator Training is an intense two-day course designed to provide students with a complete understanding of the threat posed by the use of steganographic technologies in the current digital environment, and the tools to help mitigate that threat. The course will discuss the steganography tools used by criminals exploiting children, terrorists, and crime organizations. Students will learn how suspects create covert communication channels and how disgruntled employees can easily transmit proprietary information outside the company. Students also learn how to conduct a complete steganography investigation. Stages from steganography suspicion to detection, analysis, cracking, and finally to possible recovery of the hidden information are presented both in lecture and lab environments.   
+
WetStone has engineered a three-day interactive lab environment that allows each student to experience real investigative  scenarios in a cyber safe environment. WetStone’s multi-pronged approach to this bootcamp allows each student to utilize the latest tools and technologies used by today’s criminals, and to practice the requisite live approach to investigation. This learning environment is the most effective approach to acquiring deep knowledge regarding both the latest threats and to   practice in live investigation techniques and methodologies.
 +
   
  
  
'''Is Steganography Really a Threat?'''
+
'''Unique Cyber-Safe Environment'''
  
In the last decade, the technology for digitally manipulating image, video, and audio data has advanced tremendously, resulting in the ability to rapidly hide information in binary data files. Numerous web sites offer “stego” programs free for  downloading and it often does not require any type of identification. It is no longer correct to assume that those suspects using steganography are advanced. As it become easier and easier to obtain tools to create such messages, we are finding a broader base of users. The potential for industrial espionage, trade secret theft, cyber weapon exchange, and criminal coordination are boundless.  
+
WetStone has created a unique virtualized cyber-safe environment where investigators and IT professionals can safely use and experiment with some of the best malicious software and incident response tools including...  
  
 +
▫ Botnets
 +
▫ Rootkits
 +
▫ Sidejacking
 +
▫ Wireless cracking
 +
▫ Live Triage
 +
▫ Memory Analysis
 +
▫ Log Analysis
 +
▫ Process Port Linkage
  
'''Who Should Attend?'''
 
  
▫ Criminal Investigators
+
Students are provided with all tools and a cyber-safe laboratory environment with exercises installed for the lecture and hands-on portions of the class. In addition, all students will receive copies of the lecture and lab exercises and a reference CD. Those sitting for, and passing WetStone's written and practical exam, will receive WetStone Certification.
▫ Local, state and federal law enforcement
+
▫ Private investigators
+
▫ IT security professionals
+
▫ Security auditors
+
  
 
'''Skills Learned'''
 
 
Upon completion of the course, students will have gained knowledge in the fundamentals of the steganography investigation process.
 
 
▫ Identification of steganography programs
 
▫ Image analysis and characteristics
 
▫ Steganography embedding tools
 
▫ Evidence extraction
 
▫ Identify digital carrier files
 
 
Our trainers take you inside the minds of today’s criminals. Students completeing the class will be able to execute a full investigation in the respective discipline. Participants’ proficiency in the above skills will be tested with certification exams.
 
  
  

Revision as of 13:20, 6 October 2009

Hacking Bootcamp: Exploits and Live Incident Investigation [1]


WetStone has engineered a three-day interactive lab environment that allows each student to experience real investigative scenarios in a cyber safe environment. WetStone’s multi-pronged approach to this bootcamp allows each student to utilize the latest tools and technologies used by today’s criminals, and to practice the requisite live approach to investigation. This learning environment is the most effective approach to acquiring deep knowledge regarding both the latest threats and to practice in live investigation techniques and methodologies.


Unique Cyber-Safe Environment

WetStone has created a unique virtualized cyber-safe environment where investigators and IT professionals can safely use and experiment with some of the best malicious software and incident response tools including...

▫ Botnets
▫ Rootkits
▫ Sidejacking
▫ Wireless cracking
▫ Live Triage
▫ Memory Analysis
▫ Log Analysis
▫ Process Port Linkage


Students are provided with all tools and a cyber-safe laboratory environment with exercises installed for the lecture and hands-on portions of the class. In addition, all students will receive copies of the lecture and lab exercises and a reference CD. Those sitting for, and passing WetStone's written and practical exam, will receive WetStone Certification.




Contact Information:

1-877-WETSTONE ext 2

www.wetstonetech.com [2]