What to bring:
Just Yourself.
Each student will be provided a pre-configured laptop with all software, lecture materials and lab exercises.
|
What you will learn
Upon completion of this intense two-day course, forensic examiners, private investigators, corporate security personnel, federal, state and local law enforcement investigators, prosecutors and corporate IT personnel will have a complete understanding of the threat posed by the use of steganography in the current digital environment. Threats posed by criminals exploiting children, terrorists and criminal organizations creating covert communication channels, disgruntled employees, and corporate insiders are some of the topics that are covered.
Students will learn how to conduct a complete steganography investigation including detection, analysis, cracking, and the potential for recovery of the hidden information. The tools currently used for steganography embedding are explained, demonstrated and utilized by the students as part of the laboratory sessions. Students will use these tools, and learn how to detect their presence on suspect systems during post-mortem and in live investigations.
Students will also be trained in the use of specialized steganography detection and analysis tools in order to confirm steganography presenceboth during post-mortem system analysis, and in an online investigation. Breaking steganography will also be demonstrated, discussed and practiced during the laboratory exercises.
The course includes 5 hours of lecture, 7 hours of practical lab exercises and investigation, culminating with a 2 hour written and practical exam. Each student is provided their own laptop with all tools and laboratory exercises installed for the lecture and hands-on portions of the labs. In addition, all students will receive complimentary fully licensed copies of WetStone’s StegoSuite and Gargoyle Investigator Standard Edition software products, (including 1 year of software maintenance & updates). The steganography embedding tools used during the class, and a reference CD containing the training materials and lab exercises is also provided allowing students to review and repeat laboratory exercises after their training.
All participants are eligible to receive 1.6 CEU credits and a course completion certificate.
Those sitting for, and passing WetStone’s written and practical exam, receive a ‘Certified Steganography Examiner’ certificate.
WetStone Technologies, Inc. has executed multiple government-funded research and development projects in the area of steganography research and detection over the last 5 years, giving them unique and first-hand insight into the utilization and detection of steganography technologies. WetSone has successfully trained over 1,500 students, representing digital investigators from commercial institutions, universities, the US government, and federal, state and local law enforcement agencies throughout the county. WetStone also conducts trainings at security conferences throughout the year.
What You Will Get
Each student will receive a full-licensed copy of Stego Suite and Gargoyle Investigator Standard Edition software upon completion of the course. This includes one year of free software maintenance. Each student will also receive a copy of the lecture and lab materials, and extensive reference materials relating to steganography.
|
Trainer:
|
Chet Hosmer is a co-founder, and the CEO and Chief Scientist of WetStone Technologies, Inc. He has over 25 years of experience in developing high technology software and hardware products, and during the last 15 years, has focused on research and development of information security technologies, with specialty areas including: cyber forensics, secure time, and intrusion detection and response.
Chet is a co-chair of the National Institute of Justice’s Electronic Crime and Terrorism Partnership Initiative’s Technology Working Group, and was one of five international steganography experts interviewed by ABC News after the 9/11 al-Qaeda attacks. Chet has been quoted in numerous cyber security articles, and has been invited to present as both a Keynote and Plenary speaker numerous times over the course of his career.
Chet is a member of the IEEE, ACM, and he is on the editorial board for the Journal of Digital Forensic Practice. Chet holds a B.S. Degree in Computer Science from Syracuse University where he is also an adjunct professor.
|