Mark Your Calendars for June 3 - 6, 2012

Access Data
Presents

Techno Security & Digital Investigations Conference


Disclaimer: The TrainingCo.,LLC is an independent third party and does not endorse or make any claims or representations regarding the content, instructors or certifications being provided by the companies producing the training and certifications. All the pre and post conference training courses referenced below are the sole property of the respective company and is not part of TheTrainingCo., LLC, the Techno Security or Techno Forensic Conferences. All people wishing to attend any of the courses listed below must do so on the respective training site using the hyperlinks contained in the listing. 

____________________________________________________________________

First Annual 2012 Techno Security Golf Classic

Please Join Us for a Round of Golf! Participation is open to all Techno Security exhibitors/attendees and spouses/guests.

Register Now

Techno Security 2012 will include several new bonus sessions as well as our popular pre-conference events and post-conference events. The ability to take these popular training classes in conjunction with our annual sellout conference makes Techno Security a first-choice event as you plan your yearly training budget.

BONUS: When you register for select classes shown below, you can receive a FREE VIP PASS to the 2012 Techno Security Conference.

Pre-Conference Events
Click logo to view more about each class
Access Data

 

Dates: May 31st - June 2

Location: Marriott Grande Dunes Hotel; Myrtle Beach, SC

AccessData BootCamp

This course provides students with the knowledge and skills necessary to install, configure, and effectively use the combined abilities of AccessData's Forensic Toolkit (FTK) and Password Recovery Toolkit® (PRTK®) to locate and examine email messages, deleted files, free space and file slack. Additionally, students will learn how to search for and export graphic files, export and gain access to encrypted files from multiple industry-standard applications, document digital media information, work with multiple forensic image formats and much more.

Registration:
Contact us at sales@accessdata.com or call us at 800.574.5199 (US) or +1.801.377.5410 (International)

____________________________________________________________________

 

Access Data

Dates: May 31st - June 2

Location: Marriott Grande Dunes Hotel; Myrtle Beach, SC

Smart Devices

This is a hands-on, intensive course covering the acquisition and analysis of smart devices to include the iPad, iPhone and Android. Students will learn how to utilize MPE+ to acquire both logical and physical images of these devices, and they will analyze data from these devices using both MPE+ and FTK. Students will walk away from this course knowing valuable techniques to uncover evidence on devices that previously presented a great challenge to examiners, such as the iPad.

Registration:
Contact us at sales@accessdata.com or call us at 800.574.5199 (US) or +1.801.377.5410 (International)

____________________________________________________________________
Teel

 

Advanced Mobile Forensics - Flasher Box and JTAG Introduction Course

Dates: May 31st - June 2

Location: Marriott Grande Dunes Hotel: Myrtle Beach , SC


Day One - Flash Memory

Understanding what flash memory is, how it works and how data is stored on it.
What is physical memory?
Validating your acquisitions.
Automated and manual data carving of the recovered user data
What tools you can use against you data dumps.

Day Two Flasher Boxes

What are Flasher Boxes – Basics.
Flasher Boxes proper set up and use.
Flasher Box data dump types and the use of USB Port Monitors to get it all.
Most used Flasher Boxes will be featured and available for practicals.
Praticals on the NS Pro.

Day Three JTAG

What is the JTAG Boundry Scan process.
TAP's, what are they, where are they and how do we connect with them.
Equipment, tools, tricks of the trade and more.
Advanced tools relating to JTAG processes.
This day will feature 3 JTAG solutions that will be available for practicals.
Practicals on the RIFF Box.

This three day course will provide you with a foundation that you can build on when it comes to Flasher Box and JTAG technology.

Price:  $2,250.00

For More Information & Class Registration click here >

_____________________________________________________________
Wetstone


UFED Ultimate Training Certification Course – led by cmdLabs

Dates: June 1-3

Location: Marriott Grande Dunes Hotel: Myrtle Beach , SC

Utilizing next-generation physical extraction and analysis capabilities, Cellebrite’s Universal Forensic Extraction Device (UFED) delivers valuable information from mobile devices – even if data has been deleted or hidden by the user. Our courses will help you master cellular technology with the UFED.

For More Information & Class Registration click here >

_____________________________________________________________



Dates:
31 May-02 Jun

Location: Marriott Grande Dunes Hotel: Myrtle Beach , SC

Information Security Assessment Methodology (ISAM)
Gain ISAM Certification through the ISATRP.

UPDATE: This course has been certified by DOD for CNSS 4012 and IASE Level II/III.

The ISAM is a hands-on, detailed and systematic way of examining cyber vulnerabilities utilizing repeatable processes and tools to examine and recommend improvements to any organizations? security posture.  Students can expect to learn an easily repeatable methodology to provide customers with a roadmap for addressing their security vulnerabilities and improving their security posture.


Registration:
Contact us at sh-admin@securityhorizon.com
or call 719-488-4500.

Download the registration form at http://www.securityhorizon.com/ISAM-Reg.pdf
More Information and Certification Requirements:
http://www.securityhorizon.com/aboutISAM.php

 

Post-Conference Events
Click logo to view more about each class

Peak Security


Real World Security: Attack, Defend, and Repel

Date: June 6-8, 2012

Location: Marriott Grande Dunes Hotel: Myrtle Beach , SC

Take the Real World Security class from Peak Security and get a free iPad, complementary VIP conference pass to TechnoSecurity 2011, and a jump start on RWSP certification.

This post conference special offering allows for a half day of introductory material on Attack, Defend, and Repel; and, two (2) intensive days of course/exercise for the security professional that wants to up the ante on their current skill sets in offensive and defensive security. This exercise will contain elements of the following:

  • Active Defense Techniques
  • Active Incident Response
  • Intrusion Detection/Prevention
  • Log Analysis
  • Reverse Engineering
  • Vulnerability Identification/scanning
  • Penetration Testing
  • LEVEL:  Intermediate to Advanced Technical Security

Successful completion of this class and the knowledge metric completes 2 of the 3 requirements for Real World Security Practitioner (RWSP) certification.

For More Information & Class Registration click here >


_____________________________________________________________
Teel

Forensics on Chinese Mobile Devices

Date: June 6-8, 2012

Location: Marriott Grande Dunes Hotel: Myrtle Beach , SC

Over 35% of the chipsets in the phones throughout the world are Chinese in origin. This is expected to increase to over 50% going forward into 2012 and beyond. Will you be prepared?
Teel Technologies’ class on Chinese mobile devices educates the community about the trend, and in the use of tools to acquire data from the devices and chipsets.  Chinese phones are spreading around the world quickly, and present both challenges and opportunities for the forensic examiner.  From carrier spec’d devices, to throwaway phones, to clones both bad and practically indistinguishable from their legitimate counterparts, Chinese phones are a unique and necessary area for examiners to pursue.  

Day One
•  The Chinese Phone Problem
•  Market Share
•  Chipsets
•  Culture
•  Forensic Solutions
•  Flasher Boxes – Hyper and Spiderman
•  Workflow
•  Reading data from the phone

Day Two
•  Phone Memory
•  Types
•  Forensic Considerations
•  Data Carving
•  Regular Expressions
•  Other Searches
•  SMS
•  Date and time stamps
•  Automated Data Carving
•  Commercial Tools
•  Open Source
•  Tarantula
•  Basics
•  Identifying chipsets
•  Reading phones

Day Three
•  Analyzing Tarantula Reads
•  Reporting with Tarantula
•  Maintaining Tarantula
•  Certification Test

Price:      $1,950.00

For More Information & Class Registration click here >

_____________________________________________________________
Teel

Advanced BlackBerry Forensics

Date: June 6-8, 2012

Location: Marriott Grande Dunes Hotel: Myrtle Beach , SC

Location: Techno-Security / Mobile Forensics Conference - Myrtle Beach, June 6 - 8, 2012

The Three-day Bootcamp on BlackBerry Forensics comprises essential areas and key concepts covered in our regular four-day class.   

The class will provide examiners with a comprehensive understanding of the BlackBerry device and its basic infrastructure in relation to the BlackBerry Enterprise Server (BES). 

The following areas will be covered:

  1. BlackBerry OS and Security
  2. BlackBerry OS File Types
  3. BlackBerry Device Behaviour and Mechanics
  4. BlackBerry IPD Creation and Structure
  5. BlackBerry Communication Methods
  6. BlackBerry Messenger (BBM)
  7. BlackBerry Physical Data Extraction and Parsing
  8. BlackBerry Event Logs
  9. BES Logs
  10. BlackBerry Malware and Malware Analytics
  11. BlackBerry Playbook File System and Data Parsing

Participants will also receive course material that will also include 12 to 13 chapters (over 700 pages total) broken down into the following areas:

Price: $2,195.00

For More Information & Class Registration click here >

_____________________________________________________________
Wetstone


Python Scripting with UFED Physical Analyzer

Dates: June 6-8

Overview:

This two-day course covers all aspects of writing scripts for UFED Physical Analyzer, demonstrating access to the API and programming concepts in all three levels – Flash Translation Layer (FTL), file system reconstruction and content file decoding. The training contains many hours of practice and programming assisted by Cellebrite's top developers. Price: $1,000

Requirements:

Training participants should already have:

· Basic Python (2.6) knowledge. Compulsory: standard collections, use of classes, ‘struct’ library, working with file streams.

· Past experience in working with UFED Physical Analyzer. Recommended – UFED training course

Course Structure:

The course is divided into 4 parts, each lasting approximately 4 hours. In each part, one hour will be dedicated for lecture and demonstrations. The remaining time will be kept for hands-on practice.

The first part will refresh the participants’ understanding with necessary Python and Physical Analyzer functionalities.

All other parts will be based on programming decoding scripts for the different levels which can be found in a mobile phone: Flash translation layer, file system and user content. We will work on one constructive example throughout the training, and each participant will generate his own script for decoding data.

For More Information & Class Registration click here >

_____________________________________________________________
Wetstone


Advanced StegAnalysis Investigator Training Class

Dates: June 7-8

Location: Marriott Grande Dunes Hotel: Myrtle Beach , SC

Thursday 9:00 - 5:00 PM
Friday 9:00 - 3:00 PM
3:00 - 5:00 PM (Optional Exam)

Students Receive: - Full Version of WetStone's StegoSuite with 1 year of Maintenance - 2 Full Days of Advanced Training and Hands on Labs - All Class and Lab Materials - Morning Refreshments and Lunch each Day - Optional Exam and Certification for those Meeting the requirements the exam has both a written and practical element Instructors: Chet Hosmer, WetStone Chief Scientist Matt Davis, WetStone Malware Analyst

For More Information & Class Registration click here >

If you would like for us to invite your group, please contact us directly to discuss special pricing and group rates.


 


The Fourteenth Annual International Techno Security Conference
will be held June 3-6 in sunny Myrtle Beach at the Myrtle Beach Marriott Resort. This conference promises to be The international meeting place for IT Security professionals from around the world. The conference will feature some of the top speakers in the industry, and will raise international awareness towards increased education and ethics in IT security.

Techno has become known as a world class training and networking event now having had attendees register from 48 different countries. Our conference has also been on the GSA schedule for several years now. Just enter Techno Security when you go to the GSA Advantage website.

If you attend just once, you will see why this conference has sold out in the exhibit hall for the past seven years as well as exceeding our attendee expectation each of those years. We're not trying to be the biggest conference, just the best. Register early and you will be able to attend our full 3 day (and evening) conference for about the same price as many half-day seminars now being advertised.

Myrtle Beach Marriott Resort
8400 Costa Verde Drive
Myrtle Beach, SC 29572

The conference starts on Sunday afternoon and ends at noon on Wednesday (agenda). Shown below are the times that the conference check-in desk will be open:

Saturday 12:00 AM - 5:00 PM
Sunday    8:00 AM - 5:30 PM
Monday   7:00 AM - 4:00 PM
Tuesday   7:00 AM - 4:30 PM











Search for

Techno Security