Black Hat Federal 2003 Training
Trainiing

Note: if the class is overfilled, then you will be wait-listed. You will be contacted should this occur.

training

Black Hat Federal Training 2003
The Sheraton Premiere at Tyson's Corner, September 29-30, 2003

All course materials, lunch and two coffee breaks will be provided. A Black Hat Certificate of Completion will be offered in addition to a Certificate of Completion from the University of Texas

Course Length: 2 days

Cost: US $1600 before September 5, 2003 or US $1800 after September 5, 2003
NOTE: this is a two day course. A Certificate of Completion will be offered.

REGISTER NOW

course description
Two Day Course
Mon, September 29 thru Tues, September 30
Forensics Tools and Processes for Windows XP® and Windows 2003 Server® Platforms
Larry Leibrock, Ph.D., Founder, eForensics, LLC
What to bring:

Students are required to provide their own laptops.

Laptop must be running Windows XP professional version. Complete with (1) CD (2) Floppy Disk Reader (3) 802.11 Ethernet NIC and optionally a wireless NIC. You should have about 300-500 MB available in a separate partition.

CDs containing tool sets and forensics images will be distributed in class.

You must provied your own laptop. No loaner computers will be provided.

REGISTER NOW

Overview:
This clinical course will involve 2 differing case investigation procedures and a set of advanced open source and proprietary tools for the imaging, forensics review and reporting processes involving both Windows® XP client and Windows 2003 Server platforms. The intensive course includes use of a set of procedures and software tools in order to properly: acquire, analyze, report and defend digitally stored case evidence on Windows systems, exclusively.

In this intensive learning experience, attendees will receive vital information about the following topics:

1. Forensic Examinations and Terms of Art - The module describes the procedures requisite to conduct an accurate and legally sufficient XP-platform forensic examination. Differing computer forensic protocols are described, including intrusive evidence recovery.

2. Windows – Architecture - This module describes the software design and architecture of the platform and its’ variants. File structures, partitions, registry and directory attributes will be described.

3. Seizure, Documenting and Reporting Digital evidence - This exercise reviews and analyzes the methods used to document and report the results of a forensic examination. Certain students will present their findings in a simulated exercise in order to reinforce their capabilities to create effective demonstrative presentations.

4. Media Preparation Methods - Students are introduced to the prevailing instruments and technologies forensically prepare digital media. This is a critically important set of procedures when imaging a suspect’s digital media in order to be assured that no digital artifacts remain from prior investigations.

5. Hardware Utilities - Forensic learners are introduced to four differing hardware devices, all of which are currently available to support computer forensic acquisitions. Certain difficulties are reviewed and the instructor will demonstrate these advanced tools.

6. Specialized Examination Tools - This is an introduction to a variety software tools for use in a computer forensic examination. Learners are required to utilize advanced software and participate in a practical exercise in order to achieve a working understanding of these tools.

7. Forensics Artifact Recovery - This is a both a discussion and hands-on lab where learners will conduct an advanced forensic examination of digital media. The focus of this lesson is to utilize tools for the recovery of digital artifacts which are unattainable by conventional methods.

8. Cryptography & Password Recovery - This topic covers digital encryption file structures and password protected data that an investigator may encounter while conducting an investigation. Students are exposed to methods to compromise passwords which are used to protect potential evidence. This information is useful when trying to investigate a computer criminal that tries to hide data of forensics interest.

9. Presentation of Digital Evidence - This is the final in-class exercise where student are faced with the challenge of presenting their findings in a liturgical setting. The students will present their findings in understandable terms, which is critical during a forensics investigation.

10. Course Final Examination - This is a wrap-up practical and knowledge based instrument that is intended to assess the student mastery of the material presented.

Prospective students should bring to the class meetings a notebook running Windows XP professional version. Complete with (1) CD (2) Floppy Disk Reader (3) 802.11 Ethernet NIC and optionally a wireless NIC. You should have about 300-500 MB available in a separate partition. CDs containing tool sets and forensics images will be distributed in class.

Course Length: 2 days

Cost: US $1600 before September 5, 2003 or US $1800 after September 5, 2003
NOTE: this is a two day course. A Certificate of Completion will be offered.

REGISTER NOW

Trainer:

Larry Leibrock, Ph.D., is a member of the McCombs Business School – The University of Texas faculty and serves as the Associate Dean and Technology Officer for the McCombs Business School. He has held or currently holds clinical teaching and research appointments at McCombs Business School, Institute for Advanced Technology, The University of Texas Law School, Emory University, Helsinki School of Economics and Monterrey Technologica in Mexico City and Monterrey. He is a member of IEEE, ACM, Internet Society, FIRST and USENIX/SAGE. He is also a member of the Department of Defense Software Engineering Institute and a participant in the Air Force Software Technology Conference. He is the founder and CTO for eForensics LLC, a private technical services firm.

Larry has delivered expert digital evidence testimony at both civil and criminal trials. He has testified for the Presidential Commission for Protection of Critical Information Infrastructure and the Senate Science Committee. He recently presented forensics testimony at an invitational conference for the Executive Office of the President. He presently serves on the Texas Infrastructure Protection Advisory Committee formed by the Attorney General of Texas. He is also appointed to the Board of Directors - Texas Department of Information Resources. Larry is active in IT industry and government systems consulting projects in the areas of systems forensics, enterprise IT operations, security and incident investigations.

Black Hat Logo
(c) 1996-2007 Black Hat