Difference between revisions of "Zombies and Botnets: Setup-Investigate-Shutdown"

From ForensicsWiki
Jump to: navigation, search
Line 1: Line 1:
'''Hacking BootcampExploits and Live Incident Investigation''' [http://www.wetstonetech.com/cgi-bin/shop.cgi?view,21]
+
'''Zombies and BotnetsSetup-Investigate-Shutdown''' [http://www.wetstonetech.com/cgi-bin/shop.cgi?view,25]
  
  
 
==  ==
 
==  ==
  
WetStone has engineered a three-day interactive lab environment that allows each student to experience real investigative  scenarios in a cyber safe environment. WetStone’s multi-pronged approach to this bootcamp allows each student to utilize the latest tools and technologies used by today’s criminals, and to practice the requisite live approach to investigation. This learning environment is the most effective approach to acquiring deep knowledge regarding both the latest threats and to  practice in live investigation techniques and methodologies.
+
WetStone has created this one-day advanced module to their Hacking Bootcamp focusing exclusively on Zombies and Botnets. Students will have unique access to our “hands-on” interactive learning environment. Students will work  together to establish a complex Botnet environment and practice investigative methods/techniques to collect criminal information. Each student will learn how to shutdown and isolate Botnet operators and individual Zombies in order to limit or preempt the damage they can cause.
 +
 
 +
 
 +
 
 +
'''Sinister Cyber Weapons'''
 +
 
 +
One of the most sinister cyber weapons to arrive on the scene in recent years are Zombies and their associated Botnets.
 
   
 
   
 +
Today's cyber investigators must possess in depth working knowledge of their internals. To accomplish this you must know how to setup, investigate, and shutdown these weapons.
  
 +
Botnets are continuing to be a global issue. These types of malicious software are penetrating our personal, corporate and government systems. Statistics are showing that up to one quarter of all computers that are connected to the  internet have become a part of a Botnet.
  
'''Unique Cyber-Safe Environment'''
 
  
WetStone has created a unique virtualized cyber-safe environment where investigators and IT professionals can safely use and experiment with some of the best malicious software and incident response tools including...
+
'''Skills Learned'''
  
Botnets
+
Upon completion of the course, students will have gained advanced knowledge in the fundamentals of Zombies and Botnets
▫ Rootkits
+
▫ Sidejacking
+
▫ Wireless cracking
+
▫ Live Triage
+
▫ Memory Analysis
+
▫ Log Analysis
+
▫ Process Port Linkage
+
  
 +
▫ Offensive planning of Zombies and Botnets
 +
▫ Investigative considerations when faced with these weapons
 +
▫ Learn the art of isolation and termination of  Botnets.
  
Students are provided with all tools and a cyber-safe laboratory environment with exercises installed for the lecture and hands-on portions of the class. In addition, all students will receive copies of the lecture and lab exercises and a reference CD. Those sitting for, and passing WetStone's written and practical exam, will receive WetStone Certification.
 
  
 +
Our trainers take you inside the minds of today’s criminals and students completeing the class will be able to execute a full investigation in the respective discipline. Participants proficiency in the above skills will be tested with certification exams.
 +
  
  

Revision as of 13:29, 6 October 2009

Zombies and Botnets: Setup-Investigate-Shutdown [1]


WetStone has created this one-day advanced module to their Hacking Bootcamp focusing exclusively on Zombies and Botnets. Students will have unique access to our “hands-on” interactive learning environment. Students will work together to establish a complex Botnet environment and practice investigative methods/techniques to collect criminal information. Each student will learn how to shutdown and isolate Botnet operators and individual Zombies in order to limit or preempt the damage they can cause.


Sinister Cyber Weapons

One of the most sinister cyber weapons to arrive on the scene in recent years are Zombies and their associated Botnets.

Today's cyber investigators must possess in depth working knowledge of their internals. To accomplish this you must know how to setup, investigate, and shutdown these weapons.

Botnets are continuing to be a global issue. These types of malicious software are penetrating our personal, corporate and government systems. Statistics are showing that up to one quarter of all computers that are connected to the internet have become a part of a Botnet.


Skills Learned

Upon completion of the course, students will have gained advanced knowledge in the fundamentals of Zombies and Botnets

▫ Offensive planning of Zombies and Botnets
▫ Investigative considerations when faced with these weapons
▫ Learn the art of isolation and termination of  Botnets.


Our trainers take you inside the minds of today’s criminals and students completeing the class will be able to execute a full investigation in the respective discipline. Participants proficiency in the above skills will be tested with certification exams.




Contact Information:

1-877-WETSTONE ext 2

www.wetstonetech.com [2]