Mark Your Calendars for May 31 - June 3, 2009

Disclaimer: The TrainingCo.,LLC is an independent third party and does not endorse or make any claims or representations regarding the content, instructors or certifications being provided by the companies producing the training and certifications. All the pre and post conference training courses referenced below are the sole property of the respective company and is not part of TheTrainingCo., LLC, the Techno Security or Techno Forensic Conferences. All people wishing to attend any of the courses listed below must do so on the respective training site using the hyperlinks contained in the listing. 

Techno Security 2009 will include several new bonus sessions as well as our
popular pre-conference events and post-conference events. The ability to
take these popular training classes in conjunction with our annual sellout
conference makes Techno Security a first-choice event as you plan your
yearly training budget.
BONUS: Register for any of the classes shown below and you will receive a FREE VIP PASS to the 2009 Techno Security Conference.
Pre-Conference Events

May 27-28, 2009
NSA IAM presented by Security Horizon, Inc

Course Description: The IAM is a two-day course for experienced Information Systems Security analysts who conduct, or are interested in conducting INFOSEC assessments of information systems. The course teaches NSA's INFOSEC assessment process, a high-level, non-intrusive process for identifying and correcting security weaknesses in information systems and networks.

May 27-29, 2009
Certified Ethical Hacker V6 - presented by EC-Council

Course Description:
This The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

Click here for more information on class.

May 28-30, 2009
AccessData Package #1 - Conference Ticket PLUS AccessData BootCamp Course:

Course Description: This course provides students with the knowledge and skills necessary to install, configure, and effectively use the combined abilities of AccessData's Forensic Toolkit (FTK) and Password Recovery Toolkit® (PRTK®) to locate and examine email messages, deleted files, free space and file slack. Additionally, students will learn how to search for and export graphic files, export and gain access to encrypted files from multiple industry-standard applications, document digital media information, work with multiple forensic image formats and much more.
May 28-30, 2009
AccessData Package #2 -- Conference Ticket PLUS Mobile Phone Examiner

Course Description: This course provides the knowledge and skills necessary to conduct a mobile phone investigation using FTK 2. Students will gain hands-on experience with cell phone imaging and analysis and will also process SIM and media cards commonly associated with mobile phone investigations. Alternate technologies will be discussed along with how to integrate them into an FTK 2 based investigation. Students will build specialized filters and column settings to aid in data analysis and reporting. Attendees should be conducting computer-related investigations and be familiar with the AccessData suite of tools.

May 28-30, 2009
Hacking BootCamp: Exploits and Live Incident Investigation presented by WetStone Technologies

Course Description:
WetStone has engineered a three-day interactive lab environment that allows each student to experience real investigative scenarios in a cyber safe environment. WetStone’s multi-pronged approach to this BootCamp allows each student to utilize the latest tools and technologies used by today’s criminals, and to practice the requisite live approach to investigation. This learning environment is the most effective approach to acquiring deep knowledge regarding both the latest threats and to practice in live investigation techniques and methodologies.

May 29-30, 2009
Windows Live Memory Forensics and Malware Analysis  

Course Description: a two-day course presented by HBGary. – This hands-on course teaches repeatable techniques for acquiring digital evidence from a live Windows system. Extracted artifacts include running processes, open files and registry keys, user accounts and logged in users, open ports and associated processes, and the identification of hooks into the IDT or SSDT. Participants will also learn how to extract data artifacts from a physical memory image, such as e-mails, internet browsing history, chat logs, etc. Once the artifacts have been identified, participants will extract and examine suspect binaries for malicious capabilities and additional evidence.

May 29-30, 2009
NSA IEM a two-day course presented by Security Horizon, Inc.

Course Description: The INFOSEC Evaluation Methodology (IEM) is a hands-on methodology for conducting evaluations of customer networks utilizing common technical evaluation tools. Students can expect to learn an easily repeatable methodology that provides each customer a roadmap for addressing their security concerns and increasing their security posture. This course is a follow on course to the popular National Security Agency's INFOSEC Assessment Methodology (IAM) and will result in an NSA certificate for those students meeting the appropriate qualifications.

May 28 - 31, 2009

Q/FE  Qualified/ Forensic Expert Certification with Forensic Examiner License presented by Security University

Finally, a tactical Forensics class that provides everything you need to know to be a Qualified/ Forensic Expert with an online exam at the end of the week and a practical validation workshop to prove your forensic skills.Learn everything relating to computer forensics & digital forensics rights. From how to establish a proper chain of custody that is admissible in a court of law to recovering files from intentionally damaged media.

Cyber crime is out performing traditional crime. Qualified/ Forensics Experts are needed by today's companies to determine the root cause of a hacker attack, collect evidence legally admissible in court, and protect corporate assets and reputation.

High-profile cases of corporate malfeasance have elevated electronic evidence discovery as indispensable to your company. A recent law review claims: A lawyer or legal team without a Forensic Expert on their case is sure to lose in today's courtroom!

In our Q/FER Qualified Forensics Expert Training class, you will:

Discover the root of how computer crimes are committed. Learn how to find traces of illegal or illicit activities left on disk with forensics tools and manual techniques. Learn how to recover data intentionally destroyed or hidden. How to recover encrypted data. Steps to collect evidence from hard drives and live systems. How to recover data from digital cameras and cell phones. You will create an effective computer crime policy, and gain the hands on skills to impleme30+++++

Register Now

Post-Conference Events

June 4-7, 2009

Q/SA & Q/PTL workshop   Qualified/SA Qualified Security Analyst"hands-on" Penetration Testing Certification and Penetration Tester License Workshop presented by Security University

The Q/SA Qualified/ Security Analyst Penetration Tester class is security analysis, penetration testing, vulnerability testing, with tactical security skills Certification & License labs. Over 40 penetration testing, shredding web apps, & privilege escalation labs. You will not get a more intense hands-on class in penetration testing and security analysis class anywhere else!

You earn a Q/SA Certification and (Optional) Q/PTLR Penetration Tester License that validates your skills. The Q/SA class has been considered by over 3500 professional security pen testers as the best penetration testing skills certification that validates you to be a Qualified Security Analyst Penetration Tester.

Daily you learn "how to test" & "how to report" network vulnerabilities and exploit bad code. We set the bar high for you to learn and practice breaking applications & exploiting vulnerabilities.

Register Now


If you would like for us to invite your group, please contact us directly to discuss special pricing and group rates.



The Eleventh Annual International Techno Security Conference
will be held May 31 to June 3 in sunny Myrtle Beach at the Myrtle Beach Marriott Resort. This conference promises to be THE international meeting place for IT Security professionals from around the world. The conference will feature some of the top speakers in the industry, and will raise international awareness towards increased education and ethics in IT security.

Techno has become known as a world class training and networking event now having had attendees register from 42 different countries. Our conference has also been on the GSA schedule for several years now. Just enter Techno Security when you go to the GSA Advantage website.

If you attend just once, you will see why this conference has sold out in the exhibit hall for the past five years as well as exceeding our attendee expectation each of those years. We're not trying to be the biggest conference, just the best. Register early and you will be able to attend our full 3 day (and evening) conference for about the same price as many half-day seminars now being advertised.

Myrtle Beach Marriott Resort
8400 Costa Verde Drive
Myrtle Beach, SC 29572

Check out our Hotel Video

The conference hotel, the Marriott Resort and Spa at Grande Dunes is now accepting reservations for Techno Security 2009.

The hotel is NOT YET full. You MUST register for the conference BEFORE trying to register for a conference hotel room. We have all rooms on hold for our conference attendees. You will be sent the instructions for registering for a hotel room when you receive your conference registration confirmation by email.

The conference starts on Sunday afternoon and ends at noon on Wednesday (agenda). Shown below are the times that the conference check-in desk will be open:

Saturday 10 AM - 5 PM
Sunday 8 AM - 6 PM
Monday 7 AM - 5 PM
Tuesday 7 AM - 5 PM

Search for

Techno Security