June 3 - 6 , 2013

Mobile Forensice World

TheTrainingCo., producers of the Techno Forensics and Techno Security conferences has announced the acquisition of Mobile Forensics World, the Worlds Only Mobile Forensics Conference.

The Mobile Forensics Conference is specifically dedicated to Federal, State and Local LE Forensic Specialists, Corporate and Private Forensic Examiners, Industry Leaders, and Academic Researchers performing Mobile Device Forensics!

With topics such as Mobile Device Forensics (Cell Phone, PDA, Smart Phone, Satellite Phone, GPS), Advanced Techniques of Mobile Forensics, SIM/USIM Card Analysis, TDMA/CDMA/GSM/iDEN Handset Analysis, Cell Site Analysis, Call Data Record Analysis, Mobile Forensics Applications, and Mobile Forensics Research this event promises to be a perfect start to a ongoing relationship for many members of this great community.

This years Mobile Forensics Conference, Hosted by Cellebrite, will be held June 3-6, 2012 at the Marriott Resort at Grande Dunes in Myrtle Beach, South Carolina and will feature the top names, vendors, presentations and training in the Mobile Forensics community.

Visit www.MobileForensicsConference.com or call 410.703.0332 for more information about attending or exhibiting.


First Annual 2012 Techno Security Golf Classic

Please Join Us for a Round of Golf! Participation is open to all Techno Security exhibitors/attendees and spouses/guests.

Register Now

Techno Security 2012 will include several new bonus sessions as well as our popular pre-conference events and post-conference events. The ability to take these popular training classes in conjunction with our annual sellout conference makes Techno Security a first-choice event as you plan your yearly training budget.

BONUS: When you register for select classes shown below, you can receive a FREE VIP PASS to the 2012 Techno Security Conference.

Pre-Conference Events
Click logo to view more about each class
Access Data


Dates: May 31st - June 2

Location: Marriott Grande Dunes Hotel; Myrtle Beach, SC

AccessData BootCamp

This course provides students with the knowledge and skills necessary to install, configure, and effectively use the combined abilities of AccessData's Forensic Toolkit (FTK) and Password Recovery Toolkit® (PRTK®) to locate and examine email messages, deleted files, free space and file slack. Additionally, students will learn how to search for and export graphic files, export and gain access to encrypted files from multiple industry-standard applications, document digital media information, work with multiple forensic image formats and much more.

Contact us at sales@accessdata.com or call us at 800.574.5199 (US) or +1.801.377.5410 (International)



Access Data

Dates: May 31st - June 2

Location: Marriott Grande Dunes Hotel; Myrtle Beach, SC

Smart Devices

This is a hands-on, intensive course covering the acquisition and analysis of smart devices to include the iPad, iPhone and Android. Students will learn how to utilize MPE+ to acquire both logical and physical images of these devices, and they will analyze data from these devices using both MPE+ and FTK. Students will walk away from this course knowing valuable techniques to uncover evidence on devices that previously presented a great challenge to examiners, such as the iPad.

Contact us at sales@accessdata.com or call us at 800.574.5199 (US) or +1.801.377.5410 (International)



Advanced Mobile Forensics - Flasher Box and JTAG Introduction Course

Dates: May 31st - June 2

Location: Marriott Grande Dunes Hotel: Myrtle Beach , SC

Day One - Flash Memory

Understanding what flash memory is, how it works and how data is stored on it.
What is physical memory?
Validating your acquisitions.
Automated and manual data carving of the recovered user data
What tools you can use against you data dumps.

Day Two Flasher Boxes

What are Flasher Boxes – Basics.
Flasher Boxes proper set up and use.
Flasher Box data dump types and the use of USB Port Monitors to get it all.
Most used Flasher Boxes will be featured and available for practicals.
Praticals on the NS Pro.

Day Three JTAG

What is the JTAG Boundry Scan process.
TAP's, what are they, where are they and how do we connect with them.
Equipment, tools, tricks of the trade and more.
Advanced tools relating to JTAG processes.
This day will feature 3 JTAG solutions that will be available for practicals.
Practicals on the RIFF Box.

This three day course will provide you with a foundation that you can build on when it comes to Flasher Box and JTAG technology.

Price:  $2,250.00

For More Information & Class Registration click here >


UFED Ultimate Training Certification Course – led by cmdLabs

Dates: June 1-3

Location: Marriott Grande Dunes Hotel: Myrtle Beach , SC

Utilizing next-generation physical extraction and analysis capabilities, Cellebrite’s Universal Forensic Extraction Device (UFED) delivers valuable information from mobile devices – even if data has been deleted or hidden by the user. Our courses will help you master cellular technology with the UFED.

For More Information & Class Registration click here >


May 31 - June 2

Location: Marriott Grande Dunes Hotel: Myrtle Beach , SC

Information Security Assessment Methodology (ISAM)
Gain ISAM Certification through the ISATRP.

UPDATE: This course has been certified by DOD for CNSS 4012 and IASE Level II/III.

The ISAM is a hands-on, detailed and systematic way of examining cyber vulnerabilities utilizing repeatable processes and tools to examine and recommend improvements to any organizations? security posture.  Students can expect to learn an easily repeatable methodology to provide customers with a roadmap for addressing their security vulnerabilities and improving their security posture.

Contact us at sh-admin@securityhorizon.com
or call 719-488-4500.

Download the registration form at http://www.securityhorizon.com/ISAM-Reg.pdf
More Information and Certification Requirements:


Post-Conference Events
Click logo to view more about each class


Forensics on Chinese Mobile Devices

Date: June 6-8, 2012

Location: Marriott Grande Dunes Hotel: Myrtle Beach , SC

Over 35% of the chipsets in the phones throughout the world are Chinese in origin. This is expected to increase to over 50% going forward into 2012 and beyond. Will you be prepared?
Teel Technologies’ class on Chinese mobile devices educates the community about the trend, and in the use of tools to acquire data from the devices and chipsets.  Chinese phones are spreading around the world quickly, and present both challenges and opportunities for the forensic examiner.  From carrier spec’d devices, to throwaway phones, to clones both bad and practically indistinguishable from their legitimate counterparts, Chinese phones are a unique and necessary area for examiners to pursue.  

Day One
•  The Chinese Phone Problem
•  Market Share
•  Chipsets
•  Culture
•  Forensic Solutions
•  Flasher Boxes – Hyper and Spiderman
•  Workflow
•  Reading data from the phone

Day Two
•  Phone Memory
•  Types
•  Forensic Considerations
•  Data Carving
•  Regular Expressions
•  Other Searches
•  SMS
•  Date and time stamps
•  Automated Data Carving
•  Commercial Tools
•  Open Source
•  Tarantula
•  Basics
•  Identifying chipsets
•  Reading phones

Day Three
•  Analyzing Tarantula Reads
•  Reporting with Tarantula
•  Maintaining Tarantula
•  Certification Test

Price:      $1,950.00

For More Information & Class Registration click here >


Advanced BlackBerry Forensics

Date: June 6-8, 2012

Location: Marriott Grande Dunes Hotel: Myrtle Beach , SC

Location: Techno-Security / Mobile Forensics Conference - Myrtle Beach, June 6 - 8, 2012

The Three-day Bootcamp on BlackBerry Forensics comprises essential areas and key concepts covered in our regular four-day class.   

The class will provide examiners with a comprehensive understanding of the BlackBerry device and its basic infrastructure in relation to the BlackBerry Enterprise Server (BES). 

The following areas will be covered:

  1. BlackBerry OS and Security
  2. BlackBerry OS File Types
  3. BlackBerry Device Behaviour and Mechanics
  4. BlackBerry IPD Creation and Structure
  5. BlackBerry Communication Methods
  6. BlackBerry Messenger (BBM)
  7. BlackBerry Physical Data Extraction and Parsing
  8. BlackBerry Event Logs
  9. BES Logs
  10. BlackBerry Malware and Malware Analytics
  11. BlackBerry Playbook File System and Data Parsing

Participants will also receive course material that will also include 12 to 13 chapters (over 700 pages total) broken down into the following areas:

Price: $2,195.00

For More Information & Class Registration click here >

Peak Security

Real World Security: Attack, Defend, and Repel

Date: June 6-8, 2011

Location: Marriott Grande Dunes Hotel: Myrtle Beach , SC

Take the Real World Security class from Peak Security and get a free iPad, complementary VIP conference pass to TechnoSecurity 2011, and a jump start on RWSP certification.

This post conference special offering allows for a half day of introductory material on Attack, Defend, and Repel; and, two (2) intensive days of course/exercise for the security professional that wants to up the ante on their current skill sets in offensive and defensive security. This exercise will contain elements of the following:

  • Active Defense Techniques
  • Active Incident Response
  • Intrusion Detection/Prevention
  • Log Analysis
  • Reverse Engineering
  • Vulnerability Identification/scanning
  • Penetration Testing
  • LEVEL:  Intermediate to Advanced Technical Security

Successful completion of this class and the knowledge metric completes 2 of the 3 requirements for Real World Security Practitioner (RWSP) certification.

For More Information & Class Registration click here >


Python Scripting with UFED Physical Analyzer

Dates: June 6-8


This two-day course covers all aspects of writing scripts for UFED Physical Analyzer, demonstrating access to the API and programming concepts in all three levels – Flash Translation Layer (FTL), file system reconstruction and content file decoding. The training contains many hours of practice and programming assisted by Cellebrite's top developers. Price: $1,000


Training participants should already have:

· Basic Python (2.6) knowledge. Compulsory: standard collections, use of classes, ‘struct’ library, working with file streams.

· Past experience in working with UFED Physical Analyzer. Recommended – UFED training course

Course Structure:

The course is divided into 4 parts, each lasting approximately 4 hours. In each part, one hour will be dedicated for lecture and demonstrations. The remaining time will be kept for hands-on practice.

The first part will refresh the participants’ understanding with necessary Python and Physical Analyzer functionalities.

All other parts will be based on programming decoding scripts for the different levels which can be found in a mobile phone: Flash translation layer, file system and user content. We will work on one constructive example throughout the training, and each participant will generate his own script for decoding data.

For More Information & Class Registration click here >


Advanced StegAnalysis Investigator Training Class

Dates: June 7-8

Location: Marriott Grande Dunes Hotel: Myrtle Beach , SC

Thursday 9:00 - 5:00 PM
Friday 9:00 - 3:00 PM
3:00 - 5:00 PM (Optional Exam)

Students Receive: - Full Version of WetStone's StegoSuite with 1 year of Maintenance - 2 Full Days of Advanced Training and Hands on Labs - All Class and Lab Materials - Morning Refreshments and Lunch each Day - Optional Exam and Certification for those Meeting the requirements the exam has both a written and practical element Instructors: Chet Hosmer, WetStone Chief Scientist Matt Davis, WetStone Malware Analyst

For More Information & Class Registration click here >