Disclaimer: The TrainingCo.,LLC is an independent third party and does not endorse or make any claims or representations regarding the content, instructors or certifications being provided by the companies producing the training and certifications. All the pre and post conference training courses referenced below are the sole property of the respective company and is not part of TheTrainingCo., LLC, the Techno Security or Techno Forensic Conferences. All people wishing to attend any of the courses listed below must do so on the respective training site using the hyperlinks contained in the listing.
|Techno Security 2009 will include several new bonus sessions as well as our
popular pre-conference events and post-conference events. The ability to
take these popular training classes in conjunction with our annual sellout
conference makes Techno Security a first-choice event as you plan your
yearly training budget.
Register for any of the classes shown below and you will receive
a FREE VIP PASS to the 2009 Techno Security
IAM presented by Security Horizon, Inc
Course Description: The IAM is a two-day
course for experienced Information Systems Security analysts
who conduct, or are interested in conducting INFOSEC assessments
of information systems. The course teaches NSA's INFOSEC assessment
process, a high-level, non-intrusive process for identifying
and correcting security weaknesses in information systems
Ethical Hacker V6 - presented by EC-Council
Course Description: This The CEH
Program certifies individuals in the specific network security
discipline of Ethical Hacking from a vendor-neutral perspective.
The Certified Ethical Hacker certification will fortify the
application knowledge of security officers, auditors, security
professionals, site administrators, and anyone who is concerned
about the integrity of the network infrastructure. A Certified
Ethical Hacker is a skilled professional who understands and
knows how to look for the weaknesses and vulnerabilities in
target systems and uses the same knowledge and tools as a
here for more information on class.
Package #1 - Conference Ticket PLUS AccessData BootCamp Course:
Course Description: This course provides
students with the knowledge and skills necessary to install,
configure, and effectively use the combined abilities of AccessData's
Forensic Toolkit (FTK) and Password Recovery Toolkit® (PRTK®)
to locate and examine email messages, deleted files, free space
and file slack. Additionally, students will learn how to search
for and export graphic files, export and gain access to encrypted
files from multiple industry-standard applications, document
digital media information, work with multiple forensic image
formats and much more.
| May 28-30,
Package #2 -- Conference Ticket PLUS Mobile Phone Examiner
Course Description: This course provides
the knowledge and skills necessary to conduct a mobile phone
investigation using FTK 2. Students will gain hands-on experience
with cell phone imaging and analysis and will also process SIM
and media cards commonly associated with mobile phone investigations.
Alternate technologies will be discussed along with how to integrate
them into an FTK 2 based investigation. Students will build
specialized filters and column settings to aid in data analysis
and reporting. Attendees should be conducting computer-related
investigations and be familiar with the AccessData suite of
BootCamp: Exploits and Live Incident
Investigation presented by WetStone Technologies
Course Description: WetStone has
engineered a three-day interactive lab environment that allows
each student to experience real investigative scenarios in
a cyber safe environment. WetStone’s multi-pronged approach
to this BootCamp allows each student to utilize the latest
tools and technologies used by today’s criminals, and
to practice the requisite live approach to investigation.
This learning environment is the most effective approach to
acquiring deep knowledge regarding both the latest threats
and to practice in live investigation techniques and methodologies.
Live Memory Forensics and Malware Analysis
Course Description: a two-day course presented
by HBGary. – This hands-on course teaches repeatable techniques
for acquiring digital evidence from a live Windows system. Extracted
artifacts include running processes, open files and registry
keys, user accounts and logged in users, open ports and associated
processes, and the identification of hooks into the IDT or SSDT.
Participants will also learn how to extract data artifacts from
a physical memory image, such as e-mails, internet browsing
history, chat logs, etc. Once the artifacts have been identified,
participants will extract and examine suspect binaries for malicious
capabilities and additional evidence.
IEM a two-day course presented by Security Horizon,
Course Description: The INFOSEC Evaluation
Methodology (IEM) is a hands-on methodology for conducting
evaluations of customer networks utilizing common technical
evaluation tools. Students can expect to learn an easily repeatable
methodology that provides each customer a roadmap for addressing
their security concerns and increasing their security posture.
This course is a follow on course to the popular National
Security Agency's INFOSEC Assessment Methodology (IAM) and
will result in an NSA certificate for those students meeting
the appropriate qualifications.
May 28 - 31, 2009
Qualified/ Forensic Expert Certification with Forensic Examiner
License presented by Security University
Finally, a tactical Forensics class that provides everything
you need to know to be a Qualified/ Forensic Expert with
an online exam at the end of the week and a practical validation
workshop to prove your forensic skills.Learn everything
relating to computer forensics & digital forensics rights.
From how to establish a proper chain of custody that is
admissible in a court of law to recovering files from intentionally
Cyber crime is out performing traditional crime. Qualified/
Forensics Experts are needed by today's companies to determine
the root cause of a hacker attack, collect evidence legally
admissible in court, and protect corporate assets and reputation.
High-profile cases of corporate malfeasance have elevated
electronic evidence discovery as indispensable to your company.
A recent law review claims: A lawyer or legal team without
a Forensic Expert on their case is sure to lose in today's
In our Q/FER Qualified Forensics Expert Training class,
Discover the root of how computer crimes are committed.
Learn how to find traces of illegal or illicit activities
left on disk with forensics tools and manual techniques.
Learn how to recover data intentionally destroyed or hidden.
How to recover encrypted data. Steps to collect evidence
from hard drives and live systems. How to recover data from
digital cameras and cell phones. You will create an effective
computer crime policy, and gain the hands on skills to impleme30+++++
June 4-7, 2009
Q/SA & Q/PTL workshop Qualified/SA Qualified Security Analyst"hands-on" Penetration Testing Certification and Penetration Tester License Workshop presented by Security University
The Q/SA Qualified/ Security Analyst Penetration Tester class
is security analysis, penetration testing, vulnerability testing,
with tactical security skills Certification & License
labs. Over 40 penetration testing, shredding web apps, &
privilege escalation labs. You will not get a more intense
hands-on class in penetration testing and security analysis
class anywhere else!
You earn a Q/SA Certification and (Optional) Q/PTLR Penetration
Tester License that validates your skills. The Q/SA class
has been considered by over 3500 professional security pen
testers as the best penetration testing skills certification
that validates you to be a Qualified Security Analyst Penetration
Daily you learn "how to test" & "how to report" network
vulnerabilities and exploit bad code. We set the bar high
for you to learn and practice breaking applications &
you would like for us to invite your group, please contact
us directly to discuss special pricing and group rates.
The Eleventh Annual International Techno Security Conference will be held May 31 to June 3 in sunny Myrtle Beach at the Myrtle Beach Marriott Resort. This conference promises to be THE international meeting place for IT Security professionals from around the world. The conference will feature some of the top speakers in the industry, and will raise international awareness towards increased education and ethics in IT security.
Techno has become known as a world class training and networking event now having had attendees register from 42 different countries. Our conference has also been on the GSA schedule for several years now. Just enter Techno
Security when you go to the GSA Advantage website.
If you attend just once, you will see why this
conference has sold out in the exhibit hall for the past five
years as well as exceeding our attendee expectation each of
those years. We're not trying to be the biggest conference,
just the best. Register early and you will be able
to attend our full 3 day (and evening) conference for about
the same price as many half-day seminars now being advertised.
Myrtle Beach Marriott Resort
8400 Costa Verde Drive
Myrtle Beach, SC 29572
Check out our Hotel Video
The conference hotel, the Marriott Resort and Spa at Grande Dunes is now accepting reservations for Techno Security 2009.
The hotel is NOT YET full. You MUST register for the conference BEFORE trying to register for a conference hotel room. We have all rooms on hold for our conference attendees. You will be sent the instructions for registering for a hotel room when you receive your conference registration confirmation by email.
The conference starts on Sunday afternoon and ends at noon on Wednesday (agenda). Shown below are the times that the conference check-in desk will be open:
Saturday 10 AM - 5 PM
Sunday 8 AM - 6 PM
Monday 7 AM - 5 PM
Tuesday 7 AM - 5 PM