Mark Your Calendars for June 1-4, 2008
in association with
Disclaimer: The TrainingCo.,LLC is an independent third party and does not endorse or make any claims or representations regarding the content, instructors or certifications being provided by the companies producing the training and certifications. All the pre and post conference training courses referenced below are the sole property of the respective company and is not part of TheTrainingCo., LLC, the Techno Security or Techno Forensic Conferences. All people wishing to attend any of the courses listed below must do so on the respective training site using the hyperlinks contained in the listing.
|Techno Security 2008 will include several new bonus sessions as well as our popular pre-conference events. The ability to take these popular training classes in conjunction with our annual sellout conference makes Techno Security a first-choice event as you plan your yearly training budget.|
|BONUS: Register for any of the classes shown below and you will receive a FREE VIP PASS to the 2008 Techno Security Conference.|
|May 28-30, 2008 – Certified Ethical Hacker V6 This course prepares you for the top hacking certification in the industry, presented by EC-Council. with a total of 28 new and never seen before modules, covering the latest concepts, featuring more real life cases, and showcasing the latest hacking and security tools, the Certified Ethical Hacker (Version 6) will be the most advanced course ever. Led by Master Instructor – Chuck Swanson.|
|May 28-30, 2008 – Computer Hacking Forensic Investigator a three-day course presented by EC- Council – Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information.|
|May 29-30, 2008 – EC-Council System Analyst and Licensed Penetration (ECSA/LPT) The EC-Council System Analyst and Licensed Penetration (ECSA/LPT) certification is like no other! Providing real world hands on experience, it is the only in-depth Advanced Hacking and Penetration Testing class available that covers testing in all modern infrastructures, operating systems and application environments. Led by Master Instructor – Larry Detar.|
|May 29-31, 2008 – AccessData BootCamp This course provides students with the knowledge and skills necessary to install, configure, and effectively use the combined abilities of AccessData’s Forensic Toolkit (FTK) and Password Recovery Toolkit (PRTK) to locate and examine email messages, deleted files, free space and file slack. Additionally, students will learn how to search for and export graphic files, as well as export and gain access to encrypted files from multiple industry standard applications. Documenting digital media information and working with multiple forensic image formats are also explored.This intermediate level, hands-on intensive course is intended for Forensic Investigators, Law Enforcement Personnel and Security and Network Administrators that are responsible for creating cases that examine, analyze, and classify digital evidence. The AccessData BootCamp course includes an optional Practical Skills Assessment (PSA) that requires participants to apply concepts presented during the course to complete a practical exercise. Participants who successfully complete this exercise receive a certificate of PSA completion.|
|May 29-31, 2008 – AccessData Windows Forensics (Registry) In the continually evolving Windows Forensics series, the Windows registry continues to be a major source of Windows related artifact and information storage. Having the proper knowledge of registry based artifacts can make or break an investigation. In this course, attendees will utilize AccessData technology while being exposed to:• Registry hive, cell and “hbin” block construction|
• Live registry file capture from a Windows environment
• Carving registry key information from dumped memory files
• Registry testing, analysis and reporting technology
• Registry back-ups (system Volume Information and Restore Points)
• Tracking Trojan Horse programs through a suspect registry
• Tracking file associations and class ID information
• Analyzing mounted device association (USB and other devices)
• Discovering machine compromise through registry infiltration
|May 30-31, 2008 – Live Investigator Training a two-day course presented by WetStone Technologies, Inc – During this class students will learn techniques for blueprinting a network and capturing digital evidence from running targets. Establishing network mappings and host roles is a critical part of live investigations. Live captures include running process state, open handles, system logs, active shares, and mounted devices. Class participants will also learn how to capture and analyze volatile virtual/physical memory, and how to perform live malware investigations.|
|May 30-31, 2008 – Steganography Investigator Training a two-day course presented by WetStone Technologies, Inc. – This intense two-day course provides students a deep understanding of the threat posed by the use of steganography along with tools and techniques necessary to investigate steganography incidents. The course will discuss the tools used by criminals exploiting children, terrorists, and intellectual property theft and crime organizations. Students learn how criminals create covert communication channels, and how disgruntled employees can easily transmit proprietary information outside the company.|
|May 30-31, 2008 – Cell Phone and Portable Storage Forensics SV a two-day course presented by High Tech Crime Institute – The world of law enforcement and corporate security is quickly being out paced by the portable technologies now available. This 2 day course of instruction is designed to provide an Investigator the training and proper tools necessary to seize and investigate cell phones and portable storage devices. Our hands-on course puts the student behind a computer workstation with specialized software. You will learn how to properly seize, examine, and investigate devices related to the portable digital environment.|
|May 31, 2008 – Network Security Operations – by TaoSecurity, Here is the Course Outline:Network Security Monitoring: This includes NSM theory; Building and deploying NSM sensors; Accessing wired traffic; Full content tools; Additional data analysis tools; Session data tools; Statistical data tools; Sguil; Case studies, personal war stories, and attendee participation. Network Incident Response: Simple steps to take now that make incident response easier later; Characteristics of intruders, such as their motivation, skill levels, and techniques; Common ways intruders are detected, and reasons they are often initially missed; Improved ways to detect intruders based on network security monitoring principles; First response actions and related best practices; Secure communications among IR team members, and consequences of negligence; Approaches to remediation when facing a high-end attacker; Short, medium, and long-term verification of the remediation plan to keep the intruder out Network Forensics: Collecting network traffic as evidence; Protecting and preserving traffic from tampering, either by careless helpers or the intruder himself; Analyzing network evidence using a variety of open source tools, based on network security monitoring (NSM) principles; Presenting findings to lay persons, such as management, juries, or judges; Defending the conclusions reached during an investigation, even in the face of adversarial defense attorneys or skeptical business leaders.|
|June 5-6, 2008 – CD/DVD Forensics 2 day hands-on exciting course presented by Paul Crowley, author of the book CD/DVD Forensics, President of InfinaDyne and the expert in CD/DVD forensics recovery. His forensic Software products are currently used in 131 countries. The class will teach how to examine the good & damaged CDs and DVDs for the purposes of collecting evidence. This covers CD and DVD construction & manufacturing, special considerations for new discs such as Blu-Ray & HD DVD, Logical file systems, evidence handling considerations & the use of tool CD/DVD Inspector. Also covered are disc “triage” procedures for dealing with marginal & damaged discs, generating reports & documents, Information hiding, exercises using CD/DVD Inspector, Robotic Loader Introduction, CD/DVD Inspector Advanced Use & the examination leading to the Certificate of Completion.|
Remember 39% of all evidence is found on CDs & DVDs..are you getting yours?
If you would like for us to invite your group, please contact us directly to discuss special pricing and group rates.
The Tenth Annual International Techno Security Conference , the first AccessData Users conference, and the first USA Hacker Halted Conference will be held concurrently in 2008. These conferences promise to be THE international meeting place for IT Security professionals from around the world. The conference will feature some of the top speakers in the industry, and will raise international awareness towards increased education and ethics in IT security. Attendees who register for the Techno Security Conference will be able to attend the Hacker Halted Conference and the AccessData Users conference without any additional costs.
Techno has become known as a world class training and networking event now having had attendees register from 42 different countries. Our conference has also been on the GSA schedule for several years now. Just enter Techno Security when you go to the GSA Advantage website.
If you attend just once, you will see why this conference has sold out in the exhibit hall for the past five years as well as exceeding our attendee expectation each of those years. We’re not trying to be the biggest conference, just the best. Register early and you will be able to attend our full 3 day (and evening) conference for about the same price as many half-day seminars now being advertised.
Myrtle Beach Marriott Resort
8400 Costa Verde Drive
Myrtle Beach, SC 29572
The conference starts on Sunday afternoon and ends at noon on Wednesday (agenda). Shown below are the times that the conference check-in desk will be open:
Saturday 10 AM – 5 PM
Sunday 8 AM – 8 PM
Monday 7 AM – 5 PM
Tuesday 7 AM – 5 PM