2017 is over for my events!

I just finished my last event of the year 2017. I have a few training sessions and hosted presentations scheduled in 2018, but for 2017, I have completed the year with an average of more than 1 a month.  Next year, my goal is to cut the number of classes and presentations in half or less...

If you'd like a presentation or training, feel free to contact me for more information.  Generally, I have been limiting most of my training to internally hosted organizations, such as government agencies and corporations.  However, I am open to presenting anywhere if I can meet your needs.  As to some of the courses I have given, here are some of what I have presented in classrooms across the US in 2016 and 2017:

  • Placing the Suspect Behind the Keyboard (1 and 2-day workshops)
  • X-Ways Forensics Practitioner's Guide course (2-day workshop)
  • Digital Forensics Foundations (5-day course)
  • Digital Forensics - Windows Intermediate (5-day course)
  • Digital Forensics - Mobile Devices (3-day course)
  • Open Source Intelligence/Dark Web Investigations (2-day course)
  • Covert acquisitions (2-day course)

I will have a Bitcoin Forensics Course available mid-2018, both online and in the classroom.

Avoiding Cybercrime Victimization

From April 23, 2016 11:00 until April 23, 2016 12:30
Categories: Presentation
Tags: Public, Free

I'll be giving a public presentation (free to anyone) at the King County Library in Issaquah, Washington on Avoiding Cybercrime Victimization.  Not only am I going to show how to avoid being a victim of cybercrime, but also how to surf the Internet anonymously, protect your personal information from being posted online, dealing with cyberbullying and harrassment, and guidelines on creating family rules for Internet use.

The amount of information I  will be throwing out is quite a bit in a short period of time. However, you will certainly get so much out of the presentation to make it worthwhile. The last thing I would ever suggest is throwing out the home computer as you can use it safely for education, entertainment, business, and personal use while avoiding the hazards of cybercrime.