What to bring:
Just yourself! All tools and materials will be provided to you.
|
CLOSED
WetStone Technologies, Inc., Security Horizon and Black Hat are proud to announce the availability of their Steganography Investigator Training Course. This two-day course provides detailed information and hands-on practice for individuals responsible for investigating the suspected use of digital steganography. Upon completion of the course, students can expect to have detailed background information about the latest steganography tools, the knowledge necessary to conduct a thorough investigation and the ability to present their findings in a court of law.
Students will first be given an overview of steganography to include how it is used by criminals and terrorists. They will learn about best-of-breed technologies and how they embed information in both digital image and audio carriers. Unique to this course is that students will have the opportunity to work with a number of these tools, allowing them to become familiar with what is available and how they may be used in the unauthorized transmission of information. Once the foundation is established, the course goes on to teach investigative strategies, techniques and tools that will assist in the discovery and preservation of evidence. Both forensic and web-based investigative methods will be covered. The course ends with an exercise in which students will be required to report their findings in a courtroom presentation.
This course is hands-on and allows students to use tools and techniques employed by criminals to hide information as well as the methods and strategies necessary to discover and present this as evidence. All hardware and software will be provided and students will receive a copy of course materials and steganography tools. Students will also have the option to purchase WetStone Technologies steganography detection products at a special Black Hat conference price. A certificate of completion will be awarded at the end of the course.
Pre-requisites
Students will be required to have basic computer skills and knowledge of the Windows environment. They will be subject to a background verification prior to final acceptance into the course. Students are not required to provide any materials.
Who should attend?
- Law enforcement
- Intelligence
- Security Consultants
- Corporate Investigators
- Forensic Accountants
- Other IT Investigators
Course Length: 2 days
Cost: US $2000 on or before September 5, 2003, or US $2200 after September 5, 2003
NOTE: this is a two day course. A Black Hat Certificate of Completion will be offered.
CLOSED
|
Trainer:
|
Chet Hosmer is a co-founder, and the President and CEO of WetStone Technologies, Inc. He has over 25 years of experience in developing high technology software and hardware products, and during the last 15 years, has focused on research and development of information security technologies. His specialty areas include: secure time, intrusion detection and response, and cyber forensics.
Chet is a co-chair of the Technology Working Group, one of the seven working groups of the National Institute of Justice's Electronic Crime and Terrorism Partnership Initiative. He is also the Director of the Computer Forensics Research and Development Center of Utica College. Chet is a member of the IEEE and the ACM, and holds a B.S. Degree in Computer Science from Syracuse University.
|