Mining for P2P Evidence training at Techno Security 2010

WetStone is offering a new class at Techno Security 2010: Mining for P2P Evidence

Criminals utilize Peer to Peer technologies to communicate, share information and contraband. In addition, malicious software such as Botnets, Zombies and Trojans utilize these protocols for command and control once target computers have been compromised. During this one day emersion class students will use the latest tools, techniques and methodologies to extract and examine information from P2P activities.

More information at

Leave a Comment

Latest Articles