Difference between revisions of "Zombies and Botnets: Setup-Investigate-Shutdown"

From ForensicsWiki
Jump to: navigation, search
(New page: '''Steganography Investigator Training''' [https://www.wetstonetech.com/cgi/shop.cgi?view,6] == == Steganography Investigator Training is an intense two-day course designed to provide ...)
 
 
(3 intermediate revisions by the same user not shown)
Line 1: Line 1:
'''Steganography Investigator Training''' [https://www.wetstonetech.com/cgi/shop.cgi?view,6]
+
'''Zombies and Botnets:  Setup-Investigate-Shutdown''' [http://www.wetstonetech.com/cgi-bin/shop.cgi?view,25]
  
  
 
==  ==
 
==  ==
  
Steganography Investigator Training is an intense two-day course designed to provide students with a complete understanding of the threat posed by the use of steganographic technologies in the current digital environment, and the tools to help mitigate that threat. The course will discuss the steganography tools used by criminals exploiting children, terrorists, and crime organizations. Students will learn how suspects create covert communication channels and how disgruntled employees can easily transmit proprietary information outside the company. Students also learn how to conduct a complete steganography investigation. Stages from steganography suspicion to detection, analysis, cracking, and finally to possible recovery of the hidden information are presented both in lecture and lab environments.
+
WetStone has created this one-day advanced module to their Hacking Bootcamp focusing exclusively on Zombies and Botnets. Students will have unique access to our “hands-on” interactive learning environment. Students will work  together to establish a complex Botnet environment and practice investigative methods/techniques to collect criminal information. Each student will learn how to shutdown and isolate Botnet operators and individual Zombies in order to limit or preempt the damage they can cause.
  
  
'''Is Steganography Really a Threat?'''
 
  
In the last decade, the technology for digitally manipulating image, video, and audio data has advanced tremendously, resulting in the ability to rapidly hide information in binary data files. Numerous web sites offer “stego” programs free for  downloading and it often does not require any type of identification. It is no longer correct to assume that those suspects using steganography are advanced. As it become easier and easier to obtain tools to create such messages, we are finding a broader base of users. The potential for industrial espionage, trade secret theft, cyber weapon exchange, and criminal coordination are boundless.
+
'''Sinister Cyber Weapons'''
  
 +
One of the most sinister cyber weapons to arrive on the scene in recent years are Zombies and their associated Botnets. 
 +
 +
Today's cyber investigators must possess in depth working knowledge of their internals. To accomplish this you must know how to setup, investigate, and shutdown these weapons.
  
'''Who Should Attend?'''
+
Botnets are continuing to be a global issue. These types of malicious software are penetrating our personal, corporate and government systems. Statistics are showing that up to one quarter of all computers that are connected to the  internet have become a part of a Botnet.
 
+
▫ Criminal Investigators
+
▫ Local, state and federal law enforcement
+
▫ Private investigators
+
▫ IT security professionals
+
▫ Security auditors
+
  
  
 
'''Skills Learned'''
 
'''Skills Learned'''
  
Upon completion of the course, students will have gained knowledge in the fundamentals of the steganography investigation process.
+
Upon completion of the course, students will have gained advanced knowledge in the fundamentals of Zombies and Botnets
 +
 
 +
▫ Offensive planning of Zombies and Botnets
 +
▫ Investigative considerations when faced with these weapons
 +
▫ Learn the art of isolation and termination of  Botnets.
  
▫ Identification of steganography programs
 
▫ Image analysis and characteristics
 
▫ Steganography embedding tools
 
▫ Evidence extraction
 
▫ Identify digital carrier files
 
  
Our trainers take you inside the minds of today’s criminals. Students completeing the class will be able to execute a full investigation in the respective discipline. Participants’ proficiency in the above skills will be tested with certification exams.
+
Our trainers take you inside the minds of today’s criminals and students completeing the class will be able to execute a full investigation in the respective discipline. Participants proficiency in the above skills will be tested with certification exams.
 +
  
  

Latest revision as of 14:29, 6 October 2009

Zombies and Botnets: Setup-Investigate-Shutdown [1]


WetStone has created this one-day advanced module to their Hacking Bootcamp focusing exclusively on Zombies and Botnets. Students will have unique access to our “hands-on” interactive learning environment. Students will work together to establish a complex Botnet environment and practice investigative methods/techniques to collect criminal information. Each student will learn how to shutdown and isolate Botnet operators and individual Zombies in order to limit or preempt the damage they can cause.


Sinister Cyber Weapons

One of the most sinister cyber weapons to arrive on the scene in recent years are Zombies and their associated Botnets.

Today's cyber investigators must possess in depth working knowledge of their internals. To accomplish this you must know how to setup, investigate, and shutdown these weapons.

Botnets are continuing to be a global issue. These types of malicious software are penetrating our personal, corporate and government systems. Statistics are showing that up to one quarter of all computers that are connected to the internet have become a part of a Botnet.


Skills Learned

Upon completion of the course, students will have gained advanced knowledge in the fundamentals of Zombies and Botnets

▫ Offensive planning of Zombies and Botnets
▫ Investigative considerations when faced with these weapons
▫ Learn the art of isolation and termination of  Botnets.


Our trainers take you inside the minds of today’s criminals and students completeing the class will be able to execute a full investigation in the respective discipline. Participants proficiency in the above skills will be tested with certification exams.




Contact Information:

1-877-WETSTONE ext 2

www.wetstonetech.com [2]