Black Hat Asia 2003 Training
Trainiing

Note: if the class is overfilled, then you will be wait-listed. You will be contacted should this occur.

training

Black Hat AsiaTraining 2003
The Marina Mandarin Hotel, Singapore

All course materials, lunch and two coffee breaks will be provided. A Black Hat Certificate of Completion will be offered.

Course Length: 2 days

Cost: US $1600 on or before 1 December 2003, or US $1800 after 1 December 2003
NOTE: this is a two day course. A Black Hat Certificate of Completion will be offered. All equipment and materials will be provided to you.

REGISTER NOW

Two Day Course
16-17 December 2003
Discover the Hidden – Steganography Investigator Training
WetStone Technologies
What to bring:

Just yourself! All tools and materials will be provided to you.

REGISTER NOW

WetStone Technologies, Inc., Security Horizon and Black Hat are proud to announce the availability of their Steganography Investigator Training Course. This two-day course provides detailed information and hands-on practice for individuals responsible for investigating the suspected use of digital steganography. Upon completion of the course, students can expect to have detailed background information about the latest steganography tools, the knowledge necessary to conduct a thorough investigation and the ability to present their findings in a court of law.

Students will first be given an overview of steganography to include how it is used by criminals and terrorists. They will learn about best-of-breed technologies and how they embed information in both digital image and audio carriers. Unique to this course is that students will have the opportunity to work with a number of these tools, allowing them to become familiar with what is available and how they may be used in the unauthorized transmission of information. Once the foundation is established, the course goes on to teach investigative strategies, techniques and tools that will assist in the discovery and preservation of evidence. Both forensic and web-based investigative methods will be covered. The course ends with an exercise in which students will be required to report their findings in a courtroom presentation.

This course is hands-on and allows students to use tools and techniques employed by criminals to hide information as well as the methods and strategies necessary to discover and present this as evidence. All hardware and software will be provided and students will receive a copy of course materials and steganography tools. Students will also have the option to purchase WetStone Technologies’ steganography detection products at a special Black Hat conference price. A certificate of completion will be awarded at the end of the course.

Pre-requisites
Students will be required to have basic computer skills and knowledge of the Windows environment. They will be subject to a background verification prior to final acceptance into the course. Students are not required to provide any materials.

Who should attend?

  • Law enforcement
  • Intelligence
  • Security Consultants
  • Corporate Investigators
  • Forensic Accountants
  • Other IT Investigators

Course Length: 2 days

Cost: US $1600 on or before 1 December 2003, or US $1800 after 1 December 2003
NOTE: this is a two day course. A Black Hat Certificate of Completion will be offered.

REGISTER NOW

Trainer:

Chet Hosmer is a co-founder, and the President and CEO of WetStone Technologies, Inc. He has over 25 years of experience in developing high technology software and hardware products, and during the last 15 years, has focused on research and development of information security technologies. His specialty areas include: secure time, intrusion detection and response, and cyber forensics.

Chet is a co-chair of the Technology Working Group, one of the seven working groups of the National Institute of Justice's Electronic Crime and Terrorism Partnership Initiative. He is also the Director of the Computer Forensics Research and Development Center of Utica College. Chet is a member of the IEEE and the ACM, and holds a B.S. Degree in Computer Science from Syracuse University.

Ed Fuller is the Senior Vice President and COO for Security Horizon, a Colorado Springs based information security professional services firm. He has over 28 years of experience in Operations, Communications, Computer Information Systems and Security. He is the primary lead for INFOSEC Assessments and Training for Security Horizon and has served other companies as an INFOSEC Training Manager and Senior Security Consultant. Ed also serves as a Lead Instructor for the National Security Agency (NSA) Information Assurance Methodology (IAM). Ed retired from the United States Navy with over 23 years of distinguished service. He received a B.S. in Information Systems Management from the University of Maryland and holds CISSP, GSEC, and IAM certifications. He is a member of the Center for Internet Security and the Information Systems Security Engineering Association.

Michele Fincher is the Director of Business Development for WetStone Technologies, Inc. Her areas of responsibility include corporate marketing, sales, training, and strategic partnerships. Michele has served other companies as a Marketing Research Consultant as well as a Product Marketing Engineer in the semiconductor industry. Her areas of responsibility included market analysis and strategy, product introduction and price control, and technical support of customers and a sales force covering the western half of the U.S. and Europe. Prior to the high-tech industry, Michele served in the United States Air Force, finishing her active duty career as Assistant Professor at the United States Air Force Academy. Michele holds a B.S. degree in Human Factors Engineering from the United States Air Force Academy and a M.S. degree in Counseling from Auburn University.

Black Hat Logo
(c) 1996-2007 Black Hat