What to bring:
Just Yourself.
Each student will be provided a pre-configured laptop with all software, lecture materials and lab exercises.
|
What you will learn
This course provides students with hands-on practical experience with numerous examples of modern steganography tools and technologies. In addition, students will gain experience in the latest methods of investigation designed to identify, analyze and recover hidden information and evidence. Threats posed by criminals exploiting children, terrorists and criminal organizations creating covert communication channels, disgruntled employees, and corporate insiders are some of the topics that are covered.
Students will learn how to conduct a complete steganography investigation including detection, analysis, cracking, and the potential for recovery of the hidden information. Cutting edge tools currently used for steganography embedding are explained, demonstrated and utilized by the students as part of the laboratory sessions. These tools consist of the latest in steganography technology including the creation of TCP/IP covert channels, video data embedding, MP3 data hiding, and graffiti based steganography methods. Students will use these tools, and learn how to detect their presence on suspect systems during post-mortem and in live investigations.
Students will also be trained in the use of specialized steganography detection and analysis tools in order to confirm steganography presenceboth during post-mortem system analysis, and in an online investigation. Breaking steganography will also be demonstrated, discussed and practiced during the laboratory exercises.
The course includes 5 hours of lecture, 7 hours of practical lab exercises and investigation, culminating with a 2 hour written and practical exam. Each student is provided their own laptop with all tools and laboratory exercises installed for the lecture and hands-on portions of the labs. In addition, all students will receive a complimentary fully licensed copy of WetStone’s StegoSuite software which now includes a database of over 500 known steganography programs, (including 1 year of software maintenance & updates). The steganography embedding tools used during the class, and a reference CD containing the training materials and lab exercises is also provided allowing students to review and repeat laboratory exercises after their training.
All participants are eligible to receive 1.6 CEU credits (there is an addtional fee for this) and a course completion certificate.
Those sitting for, and passing WetStone’s written and practical exam, receive a ‘Certified Steganography Investigator’ certificate.
WetStone Technologies, Inc. has executed multiple government-funded research and development projects in the area of steganography research and detection over the last 5 years, giving them unique and first-hand insight into the utilization and detection of steganography technologies. WetStone has successfully trained over 1,500 students, representing digital investigators from commercial institutions, universities, the US government, and federal, state and local law enforcement agencies throughout the county. WetStone also conducts trainings at security conferences throughout the year.
What You Will Get
Each student will receive a full-licensed copy of Stego Suite upon completion of the course. This includes one year of free software maintenance. Each student will also receive a copy of the lecture and lab materials, and extensive reference materials relating to steganography.
|
Trainer:
|
Chet Hosmer is the Chief Scientist of WetStone Technologies, Inc. a subsidiary of Allen Corporation of America. He has over 25 years of experience in developing high technology software and hardware products, and during the last 15 years, has focused on research and development of information security technologies, with specialty areas including: cyber forensics, secure time, and intrusion detection and response.
Chet is a co-chair of the National Institute of Justice’s Electronic Crime and Terrorism Partnership Initiative’s Technology Working Group, and was one of five international steganography experts interviewed by ABC News after the 9/11 al-Qaeda attacks. Chet has been quoted in numerous cyber security articles, and has been invited to present as both a Keynote and Plenary speaker numerous times over the course of his career.
Chet is a member of the IEEE, ACM, and he is on the editorial board for the Journal of Digital Forensic Practice. Chet holds a B.S. Degree in Computer Science from Syracuse University where he is also an adjunct professor.
|