Mark Your Calendars for June 5 - 8 , 2011
 

Techno Security & Digital Investigations Conference


Disclaimer: The TrainingCo.,LLC is an independent third party and does not endorse or make any claims or representations regarding the content, instructors or certifications being provided by the companies producing the training and certifications. All the pre and post conference training courses referenced below are the sole property of the respective company and is not part of TheTrainingCo., LLC, the Techno Security or Techno Forensic Conferences. All people wishing to attend any of the courses listed below must do so on the respective training site using the hyperlinks contained in the listing. 

Techno Security 2011 will include several new bonus sessions as well as our popular pre-conference events and post-conference events. The ability to take these popular training classes in conjunction with our annual sellout conference makes Techno Security a first-choice event as you plan your yearly training budget.

BONUS: When you register for select classes shown below, you can receive a FREE VIP PASS to the 2011 Techno Security Conference.

Pre-Conference Events
Click logo to view more about each class
Teel


Dates: June 2 - 4

Advanced BlackBerry Forensic Training

TeelTech's three-day BlackBerry Forensic course provides examiners with a comprehensive education on the BlackBerry platform, and the methods and tools available to get extensive data from the device, back-up files and BES server. Taught by veteran smart phone digital forensic examiner, Shafik Punja, the class exposes students to techniques that go beyond the standard logical acquisition and IPD back-up exam. Students taking the class should
be comfortable with advanced mobile device and digital forensic practice.

____________________________________________________________________
Teel


Dates: June 5

BlackBerry Malware Workshop

In this one-day workshop, students will gain a comprehensive understanding of malware threats against the BlackBerry platform, how to identify them and protect devices. Taught by veteran programmer and BlackBerry expert, Sheran Gunasekera, the class provides and solid foundation for security specialists, law enforcement and enterprise IT managers deploying or analyzing BlackBerry devices.

____________________________________________________________________
ISRM

ISATRP
Dates: June 1-4, 2010, Myrtle Beach, SC

Information Security Red Team Methodology (ISRM)
Gain ISRM Certification through the ISATRP.

The ISRM is a detailed hands-on methodology for performing evaluations of the current security readiness of an organization against current threats. Individuals can expect to learn a repeatable methodology that can be used to prepare for and conduct a Red Team engagement. It is recommended that a security professional obtain both the ISRM and the Information Security Assessment Methodology (ISAM) to assure a broad understanding of the information security analysis processes.

Registration:
Contact us at sh-admin@securityhorizon.com
or call 719-488-4500.

Download the registration form at http://www.securityhorizon.com/ISRM-Reg.pdf
More Information and Certification Requirements:
http://www.securityhorizon.com/aboutISRM.php

____________________________________________________________________

WetStone

AllenCorp

Dates: June 2, 2011

8:00 - 11:00 Discovery of Malicious Code Evidence
1:00 - 4:00 Conducting Live Investigations
4:00 - 5:00 Exam


Descriptions:

Discovery of Malicious Code Evidence

Today’s advanced computing environments with terabyte and beyond media require new approaches to rapidly and accurately identify the presence of malicious code. Beyond viruses and worms the threat of botnets, keyloggers, anti-forensic wireless hacking tools, rootkits, steganography and other threats is essential knowledge for the investigator. Knowing what is installed and in use by the adversary can help prove intent, cognizance of guilt and a better overall picture of the situation. During this hands-on lab session class participants will be exposed to the advanced malware technologies being utilized by today’s cyber criminals. During the lab session participants will utilize WetStone’s award winning malware discovery software, Gargoyle Investigator™, to detect and analyze the presence of malware found during a mock investigation. 

Participants must bring their own laptop with windows XP or above, if they wish to participate in the lab exercise. Participants that desire to become Gargoyle Investigator Certified may choose to take a certification exam at no charge.

Assessing Source Code Vulnerabilities and their impact 

Assessing and mitigating vulnerabilities in web sites, databases and applications that handle personal identifying information (PII) or electronic protected health information (EPHI) is vital. During the past year the sophistication of these vulnerabilities has grown and has become increasingly difficult to investigate without both sophisticated tools and knowledge.  

Participants will be given the opportunity to examine various web, database and application vulnerabilities along with specialized tools used by criminals that exploit them. In addition, a host of assessment and mitigation methodologies will be reviewed, demonstrated and discussed.  This is a lecture / demonstration only class, and does not include a lab session.

____________________________________________________________________
WetStone

AllenCorp

Dates: June 3, 2011

8:00 - 11:00 Conducting Live Investigations
11:00 - 12:00 Exam
1:00 - 4:00 Trait Analytics Profiling Search (T.A.P.S.) Investigations


Descriptions:

Conducting Live Investigations 

Extracting and examining live volatile evidence from running computers is becoming vital due to the size, reach and mobility of laptop, desktop and server environments. The amount of evidence that can be lost in pull-the-plug only investigations is alarming. This hands-on lab session will give participants the opportunity to use the latest Live Acquisition and Triage Tool (US-LATT) was developed by WetStone under National Institute of Justice grants.

Students that are U.S. State, Local, Federal and retired law enforcement attending the class will receive a 4GB US-LATT device with maintenance for 1 year. Others not meeting this criterion will be  able to (optionally) purchase the technology for a small fee. Student must bring their own laptop with windows XP or above, to participate in the lab exercise. Participants that desire to become US-LATT Certified may choose to take a certification exam at no charge.

Trait Analytics Profiling Search (T.A.P.S.) Investigations
(This lab is open to Law Enforcement Only)

As criminals communicate and conceal vital information in new ways, it is urgent that trained experts exist to counter this threat. A deep understanding and analysis of images, multimedia files and network protocols along with clear understanding of the known methods of data hiding are essential in order to participate in this analysis. This hands-on lab session will give participants the opportunity to use the latest Trait Analytic Profiling Search (T.A.P.S.) technology. T.A.P.S. provides direct media scanning (with write blocker), DD or Raw Image Mounting and scanning and supports scanning inside archives. Detailed reporting and time lining of results are also included. Since the T.A.P.S. core research was funded by NIJ, the software is available FREE to U.S. State and Local Law Enforcement. This lab will be open to U.S. State & Local law enforcement ONLY, and students attending the class will receive the T.A.P.S. Technology for free with maintenance for 1 year.

____________________________________________________________________
WetStone

AllenCorp

Dates: June 4, 2011

8:00 - 11:00 Conducting Live Investigations
11:00 - 12:00 Exam
1:00 - 4:00 Conducting Peer to Peer (P2P) Investigations


Descriptions:

Conducting Live Investigations 

Extracting and examining live volatile evidence from running computers is becoming vital due to the size, reach and mobility of laptop, desktop and server environments. The amount of evidence that can be lost in pull-the-plug only investigations is alarming. This hands-on lab session will give participants the opportunity to use the latest Live Acquisition and Triage Tool (US-LATT) was developed by WetStone under National Institute of Justice grants.

Students that are U.S. State, Local, Federal and retired law enforcement attending the class will receive a 4GB US-LATT device with maintenance for 1 year. Others not meeting this criterion will be  able to (optionally) purchase the technology for a small fee. Student must bring their own laptop with windows XP or above, to participate in the lab exercise. Participants that desire to become US-LATT Certified may choose to take a certification exam at no charge.

Conducting Peer to Peer (P2P) Investigations  

P2P focused investigations give investigators instant access to timely and relevant evidence and information that may assist in clearing a case and provide needed information regarding coconspirators, victims and other criminal or civil activity. This hands-on lab session will educate participants on the dangers of P2P applications along with the rich set of evidencethey can reveal. Participants will be shown how to extract vital investigative information from a number of widely used P2P applications using manually and automated tools. In addition, participants will be given a challenge lab problem to test their skills.  

Participants must bring their own laptop with windows XP or above, if they wish to participate in the hands on lab exercise.   

____________________________________________________________________


Dates:
June 2-4, 2010, Myrtle Beach, SC

Information Security Assessment Methodology (ISAM)
Gain ISAM Certification through the ISATRP.

UPDATE: This course has been certified by DOD for CNSS 4012 and IASE Level II/III.

The ISAM is a hands-on, detailed and systematic way of examining cyber vulnerabilities utilizing repeatable processes and tools to examine and recommend improvements to any organizations? security posture.  Students can expect to learn an easily repeatable methodology to provide customers with a roadmap for addressing their security vulnerabilities and improving their security posture.


Registration:
Contact us at sh-admin@securityhorizon.com
or call 719-488-4500.

Download the registration form at http://www.securityhorizon.com/ISAM-Reg.pdf
More Information and Certification Requirements:
http://www.securityhorizon.com/aboutISAM.php


 

____________________________________________________________________
Access Data

Dates: June 2 - 4, 2011

Location: Marriott Grande Dunes Hotel; Myrtle Beach, SC

AccessData BootCamp

This course provides students with the knowledge and skills necessary to install, configure, and effectively use the combined abilities of AccessData's Forensic Toolkit (FTK) and Password Recovery Toolkit® (PRTK®) to locate and examine email messages, deleted files, free space and file slack. Additionally, students will learn how to search for and export graphic files, export and gain access to encrypted files from multiple industry-standard applications, document digital media information, work with multiple forensic image formats and much more.

Registration:
Contact us at sales@accessdata.com or call us at 800.574.5199 (US) or +1.801.377.5410 (International)

____________________________________________________________________

 

Access Data


Dates:
June 2 - 4, 2011

Location: Marriott Grande Dunes Hotel; Myrtle Beach, SC

Smart Devices

This is a hands-on, intensive course covering the acquisition and analysis of smart devices to include the iPad, iPhone and Android. Students will learn how to utilize MPE+ to acquire both logical and physical images of these devices, and they will analyze data from these devices using both MPE+ and FTK. Students will walk away from this course knowing valuable techniques to uncover evidence on devices that previously presented a great challenge to examiners, such as the iPad.

Registration:
Contact us at sales@accessdata.com or call us at 800.574.5199 (US) or +1.801.377.5410 (International)

____________________________________________________________________
   
   
 

Post-Conference Events
Click logo to view more about each class

Peak Security


Date:
June 8-10, 2011

Real World Security: Attack, Defend, and Repel

Take the Real World Security class from Peak Security and get a free iPad, complementary VIP conference pass to TechnoSecurity 2011, and a jump start on RWSP certification.

This post conference special offering allows for a half day of introductory material on Attack, Defend, and Repel; and, two (2) intensive days of course/exercise for the security professional that wants to up the ante on their current skill sets in offensive and defensive security. Learn new tactics and receive guidance from expert instructors while you test yourself in a team vs team environment. Hands on and technical.  “Real World Security: Attack, Defend, & Repel” is a complete simulation that will not only test your existing skills, but provide you with a real life scenario where you can learn valuable new skills. Whether you work in incident response, active detection and defense, security evaluations, or penetration testing; this course will give you that incredibly rare opportunity to put it all to the test, and learn BOTH sides of the house. The class will be split into two halves, attackers and defenders. On the second exercise day, those two teams will trade sides, allowing every student the opportunity to learn both sides and work with all instructors. This exercise will contain elements of the following:

  • Active Defense Techniques
  • Active Incident Response
  • Intrusion Detection/Prevention
  • Log Analysis
  • Reverse Engineering
  • Vulnerability Identification/scanning
  • Penetration Testing
  • LEVEL:  Intermediate to Advanced Technical Security

Successful completion of this class and the knowledge metric completes 2 of the 3 requirements for Real World Security Practitioner (RWSP) certification.

Registration: 

Contact Peak Security at training@peaksec.com to start the registration process. 

Additional information available at www.peaksec.com or www.rwsp.org.

Cost:  $1995 no other discounts
Government Employees and Military:  Ask us about our GSA rate

 

____________________________________________________________________
NetSecurity

Date: June 8-10, 2011 (3 Days)

Course Name: Hands-On How-To® Malware Analysis Training

Description
NetSecurity's Hands-On How-To® Malware Analysis course teaches students the step-by-step process for quickly analyzing malware to determine the extent of their malicious intent and device appropriate countermeasures. The Hands-On How-To® Lab Exercises (HOHTLEs) covered in the course incorporate significant real-world experience necessary for delivering legally admissible world-class results in the field. Upon successful completion of the Hands-On How-To® Malware Analysis course, each participant will be armed with the knowledge, tools, and processes required in conducting advanced analysis on real-world malware specimens. Specifically, students will possess relevant knowledge and real-world hands-on skills in:

- Introduction to Malware Analysis
- Malware Hiding Places
- Extracting Malware Specimen from RAM and the Wild
- Building a Malware Analysis Lab (Environment)
- Static Analysis
- Dynamic Analysis
- Code Analysis
- Malicious Document Analysis
- Advanced Persistent (APT) Threat Malware
- Identifying and Protecting against Malware
- Malware Challenges in the Real-World

Course Syllabus: http://NetSecurity.com/training/NetSecurity-HandsOnHowTo-Training-MalwareAnalysis.pdf

Course Information:  http://netsecurity.com/training/malware_analysis_training.html

Registration Cost:

$1,695 (Early Registration – before 4/30/2011)
$2,995 (Late Registration -- after 4/30/2011)
$3,495 (On-site Registration)

 Registration Form:http://netsecurity.com/training/NetSecurity-Training-Registration.doc

 Contact Info: Training@NetSecurity.com -- http://NetSecurity.com -- 1-866-66-HOW-TO.

____________________________________________________________________
iPhone Forensics

Dates: June 9 - 10

Advanced iPhone Imaging and Investigation L-1

This two-day workshop will guide you, hands on, through imaging and electronic discovery of an iPhone, iPhone 3G, iPhone 3G[s], iPhone 4, and iPad devices covering iPhoneOS up to the latest v4.1.2 software. Attendees will receive a special iPhone forensic guide and access to automated tools used in the field by hundreds of law enforcement agencies. All of the tools and demo content will also be provided so attendees can learn and explore hands-on. The course has been revamped to cover the new 4.X operating system
and Linux based tools.

____________________________________________________________________
Teel


Dates: June 8 - 10

Advanced Mobile Device Forensics Training
Using Flasher Boxes and Today's Top Tools


Teel Technologies' Advanced Training Class provides students with the knowledge and techniques to dig deeper into today's mobile devices.  We offer a comprehensive curriculum that exposes students to the latest techniques to move beyond simple logical acquisitions, as well as expand the skill set with today's most popular commercial mobile forensic applications.

 

If you would like for us to invite your group, please contact us directly to discuss special pricing and group rates.

 


The Thirteenth Annual International Techno Security Conference
will be held June 5-8 in sunny Myrtle Beach at the Myrtle Beach Marriott Resort. This conference promises to be The international meeting place for IT Security professionals from around the world. The conference will feature some of the top speakers in the industry, and will raise international awareness towards increased education and ethics in IT security.

Techno has become known as a world class training and networking event now having had attendees register from 42 different countries. Our conference has also been on the GSA schedule for several years now. Just enter Techno Security when you go to the GSA Advantage website.

If you attend just once, you will see why this conference has sold out in the exhibit hall for the past five years as well as exceeding our attendee expectation each of those years. We're not trying to be the biggest conference, just the best. Register early and you will be able to attend our full 3 day (and evening) conference for about the same price as many half-day seminars now being advertised.

Myrtle Beach Marriott Resort
8400 Costa Verde Drive
Myrtle Beach, SC 29572

Check out our Hotel Video

The conference hotel, the Marriott Resort and Spa at Grande Dunes is now accepting reservations for Techno Security 2011.

The hotel is NOT YET full. You MUST register for the conference BEFORE trying to register for a conference hotel room. We have all rooms on hold for our conference attendees. You will be sent the instructions for registering for a hotel room when you receive your conference registration confirmation by email.

The conference starts on Sunday afternoon and ends at noon on Wednesday (agenda). Shown below are the times that the conference check-in desk will be open:

Saturday 9:00 AM – 5:00 PM
Sunday   8:00 AM – 5:30 PM
Monday  7:00 AM -  4:00 PM
Tuesday 7:00 AM -  4:30 PM











Search for

Techno Security