NetSecurity Corporation Offers Computer Forensics Training Courses

NetSecurity Corporation expands its portfolio of Hands-On How-To® security courses to include computer forensics training classes. “Rather than focus on boot-camp style training that emphasizes cramming to pass a certification exam, we [NetSecurity] take a different approach to teaching professionals how to solve real-world problems that can stand the scrutiny of legal counsel,” said Cory Epperson, director of client services of NetSecurity Corporation. “Our mission is to provide students the step-by-step and how-to process for locating, acquiring, preserving, analyzing, and producing solid digital evidence – regardless of the student’s forensics skill-set…”NetSecurity’s Hands-On How-To® courses, include: computer forensics investigation training; incident and cyber crime response training; electronic discovery training; and computer hacking training. The courses, which are offered in interactive presentations in the classroom by security and forensics expert instructors, are loaded with Hands-On How-To Lab Exercises (HOHTLEs). Upon successful completion of the Hands-On How-To® forensics courses, participants will be armed with the knowledge, tools, and processes required to produce computer evidence that can withstand legal scrutiny.

Topics covered in each class are available in a detailed syllabus at NetSecurity’s website, but include: Network Hacking, Forensics Process, Data Acquisition, Data Analysis, Windows Forensics, Internet Forensics, Unix Forensics, Mac OS Forensics, Mobile Device Forensics, Passwords and Encryption, Steganography, Volatile Data, Memory Forensics, Malware Analysis, Network Forensics, Remote Forensics, Presentation and Reporting, Anti-Forensics, Incident Response, and E-Discovery. NetSecurity also provides on-site forensics training that is tailored towards organizations’ unique requirements.

The benefits of NetSecurity’s Hands-On How-To® computer forensics training include detailed step-by-step and how-to instructions, real-world simulations of forensics challenges, seasoned expert instructors with real-world hands-on consulting and training experience, an arsenal of take-aways, up-to-date course content that addresses emerging forensics challenges, small class sizes ensuring maximum student-instructor interaction, and vendor-neutral content – covering commercial and freeware tools.

Past students have had this to say about NetSecurity’s Hands-On How-To courses:

“The instructors were very knowledgeable in computer forensics. [The] material was presented in ‘easy to understand’ format,” said one law enforcement forensics examiner.


Get The Latest DFIR News

Join the Forensic Focus newsletter for the best DFIR articles in your inbox every month.


Unsubscribe any time. We respect your privacy - read our privacy policy.

“The interaction between the students and teacher and [the use of] a lot of tools [is what I liked best about this course],” said a seasoned ethical hacker and forensics expert.

“This course has been very educational both in getting to use the latest tools and to interact with other forensics professionals,” said a senior government forensics investigator.

For a limited time only, NetSecurity is offering 50% off its list price for the computer forensics training course hosted by the Techno Forensics 2008 conference, October 23-25, 2008, in Gaithersburg, MD.

About NetSecurity Corporation

NetSecurity Corporation provides vendor-neutral digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. Through NetSecurity Forensics Labs, the company delivers world-class forensics solutions that withstand the scrutiny of litigation. Armed with seasoned security and forensics experts with deep experience with real-world problems, NetSecurity delivers unparalleled forensics and security solutions to law firms, law enforcement, Fortune 500, and government entities. NetSecurity helps its clients reach their goals in engagements involving electronic discovery, digital forensics, incident response, ethical hacking, and Hands-On How-To® Training. As a licensed private investigative firm, NetSecurity is positioned to legally conduct computer forensics investigations in Virginia and other states. Founded in 2004, NetSecurity is headquartered in Dulles, Virginia. For more information, visit www.netsecurity.com, email [email protected], or call 1-866-66-HOW-TO.

Contacts

Inventive Public Relations for NetSecurity Corporation
Christian Scarborough, 1-512-244-7088

Permalink: http://www.businesswire.com/news/home/20080930005285/en

Leave a Comment

Latest Videos

Throughout the past few years, the way employees communicate with each other has changed forever.

69% of employees note that the number of business applications they use at work has increased during the pandemic.

Desk phones, LAN lines and even VOIP have become technologies of the past workplace environment as employees turn to cloud applications on their computers and phones to collaborate with each other in today’s workplace environment.

Whether it’s conversations in Teams, file uploads in Slack chats, or confidential documents stored in Office 365, the amount of data stored and where it is stored, is growing quicker than IT and systems administrators can keep up with.

Corporate investigators and eDiscovery professionals need to seamlessly collect relevant data from cloud sources and accelerate the time to investigative and discovery review.

With the latest in Cellebrite’s remote collection suite of capabilities, investigators and legal professionals can benefit from secure collection with targeted capabilities for the most used workplace applications.

Join Monica Harris, Product Business Manager, as she showcases how investigators can:

- Manage multiple cloud collections through a web interface
- Cull data prior to collection to save time and money by gaining these valuable insights of the data available
- Collect data from the fastest growing cloud collaboration applications like Office365, Google Workspace, Slack and Box
- Login to a single source for workplace app collection without logging into every app and pulling data from multiple sources for every employee
- Utilize a single unified collection workflow for computer, mobile and workplace cloud applications without the need to purchase multiple tools for different types of collections – a solution unique to Cellebrite’s enterprise solution capabilities

Throughout the past few years, the way employees communicate with each other has changed forever.

69% of employees note that the number of business applications they use at work has increased during the pandemic.

Desk phones, LAN lines and even VOIP have become technologies of the past workplace environment as employees turn to cloud applications on their computers and phones to collaborate with each other in today’s workplace environment.

Whether it’s conversations in Teams, file uploads in Slack chats, or confidential documents stored in Office 365, the amount of data stored and where it is stored, is growing quicker than IT and systems administrators can keep up with.

Corporate investigators and eDiscovery professionals need to seamlessly collect relevant data from cloud sources and accelerate the time to investigative and discovery review.

With the latest in Cellebrite’s remote collection suite of capabilities, investigators and legal professionals can benefit from secure collection with targeted capabilities for the most used workplace applications.

Join Monica Harris, Product Business Manager, as she showcases how investigators can:

- Manage multiple cloud collections through a web interface
- Cull data prior to collection to save time and money by gaining these valuable insights of the data available
- Collect data from the fastest growing cloud collaboration applications like Office365, Google Workspace, Slack and Box
- Login to a single source for workplace app collection without logging into every app and pulling data from multiple sources for every employee
- Utilize a single unified collection workflow for computer, mobile and workplace cloud applications without the need to purchase multiple tools for different types of collections – a solution unique to Cellebrite’s enterprise solution capabilities

YouTube Video UCQajlJPesqmyWJDN52AZI4Q_g6nTjfEMnsA

Tips And Tricks Data Collection For Cloud Workplace Applications

Forensic Focus 20th March 2023 11:00 am

In this episode of the Forensic Focus podcast, Si and Desi explore the cutting-edge technology of deepfake videos and image manipulation. In addition to discussing the latest technological developments and efforts being made to detect manipulated media, they also examine the associated legal and ethical implications.

Show notes:

Boris Johnson image - https://www.theguardian.com/politics/2023/jan/10/spot-the-difference-boris-johnson-appears-scrubbed-from-photo-posted-by-grant-shapps

Deep Fake Neighbour Wars - https://m.imdb.com/title/tt21371376/

Stalin image - https://www.history.com/news/josef-stalin-great-purge-photo-retouching

Nvidia eye contact AI - https://www.polygon.com/23571376/nvidia-broadcast-eye-contact-ai and https://www.youtube.com/watch?v=xl87WTDrReo

Birthday problem - https://en.wikipedia.org/wiki/Birthday_problem

Same frightening woman in AI images - https://petapixel.com/2022/09/09/the-same-frightening-woman-keeps-appearing-in-ai-generated-images/

Inherent mysogeny of AI portraits - https://www.theguardian.com/us-news/2022/dec/09/lensa-ai-portraits-misogyny

Midjourney - https://www.midjourney.org/

Deepfake porn legality - https://www.theverge.com/2022/11/25/23477548/uk-deepfake-porn-illegal-offence-online-safety-bill-proposal and https://www.technologyreview.com/2021/02/12/1018222/deepfake-revenge-porn-coming-ban/

AIATSIS - https://aiatsis.gov.au/cultural-sensitivity

Fake tiger porn story - https://www.dailydot.com/unclick/tiger-porn-britain-law/

Group photo with no blinking - https://www.countrylife.co.uk/comment-opinion/curious-questions-group-photo-179102

Emma Watson deefake audio - https://www.thetimes.co.uk/article/ai-4chan-emma-watson-mein-kampf-elevenlabs-9wghsmt9c

Domestika - https://www.domestika.org/en/courses/981-introduction-to-interviewing-the-art-of-conversation

Investigative Interviewing - https://www.amazon.co.uk/dp/0199681899?ref=ppx_pop_mob_ap_share

Forensic Focus events calendar - https://www.forensicfocus.com/events/

Si Twitter - https://twitter.com/si_biles

In this episode of the Forensic Focus podcast, Si and Desi explore the cutting-edge technology of deepfake videos and image manipulation. In addition to discussing the latest technological developments and efforts being made to detect manipulated media, they also examine the associated legal and ethical implications.

Show notes:

Boris Johnson image - https://www.theguardian.com/politics/2023/jan/10/spot-the-difference-boris-johnson-appears-scrubbed-from-photo-posted-by-grant-shapps

Deep Fake Neighbour Wars - https://m.imdb.com/title/tt21371376/

Stalin image - https://www.history.com/news/josef-stalin-great-purge-photo-retouching

Nvidia eye contact AI - https://www.polygon.com/23571376/nvidia-broadcast-eye-contact-ai and https://www.youtube.com/watch?v=xl87WTDrReo

Birthday problem - https://en.wikipedia.org/wiki/Birthday_problem

Same frightening woman in AI images - https://petapixel.com/2022/09/09/the-same-frightening-woman-keeps-appearing-in-ai-generated-images/

Inherent mysogeny of AI portraits - https://www.theguardian.com/us-news/2022/dec/09/lensa-ai-portraits-misogyny

Midjourney - https://www.midjourney.org/

Deepfake porn legality - https://www.theverge.com/2022/11/25/23477548/uk-deepfake-porn-illegal-offence-online-safety-bill-proposal and https://www.technologyreview.com/2021/02/12/1018222/deepfake-revenge-porn-coming-ban/

AIATSIS - https://aiatsis.gov.au/cultural-sensitivity

Fake tiger porn story - https://www.dailydot.com/unclick/tiger-porn-britain-law/

Group photo with no blinking - https://www.countrylife.co.uk/comment-opinion/curious-questions-group-photo-179102

Emma Watson deefake audio - https://www.thetimes.co.uk/article/ai-4chan-emma-watson-mein-kampf-elevenlabs-9wghsmt9c

Domestika - https://www.domestika.org/en/courses/981-introduction-to-interviewing-the-art-of-conversation

Investigative Interviewing - https://www.amazon.co.uk/dp/0199681899?ref=ppx_pop_mob_ap_share

Forensic Focus events calendar - https://www.forensicfocus.com/events/

Si Twitter - https://twitter.com/si_biles

YouTube Video UCQajlJPesqmyWJDN52AZI4Q_i41eg24YGZg

Deepfake Videos And Altered Images - A Challenge For Digital Forensics?

Forensic Focus 13th February 2023 10:30 am

This error message is only visible to WordPress admins

Important: No API Key Entered.

Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.

Latest Articles

Share to...