Behind the Keyboard Workshop

From March 06, 2017 08:00 until March 07, 2017 17:00

A two-day workshop of innovative and traditional techniques to investigate computer-facilitated crimes with the intention of placing the suspects behind the keyboard.  Workshop integrates both cyber investigations (forensics) and traditional investigation methods into a complete process of working criminal investigations by thinking inside and outside the CPU.  The course includes hard copies of the Syngress books Placing the Suspect Behind the Keyboard and Hiding Behind the Keyboard.

Course is designed for general investigators (LE and PI), cybersecurity professionals (digital forensics, incident response, etc..), and attorneys litigating computer-related incidents.  Knowledge of digital forensics is not required, however, digital forensic methods will be demonstrated in portions of the course.

Course is currently a closed course (LE host only), but if host is considers opening to outside attendees, the wait list will be contacted.  To be placed on a wait list, send an email to This email address is being protected from spambots. You need JavaScript enabled to view it. with your name and telephone contact.  Notifications of wait list acceptance into the course will be no later than 7 days prior to the start of the course.

Evidence matters  
•    Collection through presentation
•    Approaches to crime scenes and decision-making charts
Interviews
•    Suspect/Witness/Victim interviews
•    Asking the ‘right’ questions
It’s more than just the computer
•    Physical investigations 
•    Electronic intercepts (wiretaps, etc…)
About a person: Compiling the Complete Identity
•    Real identity 
•    Digital identities (real, fake, and anonymous)
User activity 
•    Attributing computer activity to a specific person or persons
•    Digital forensics artifacts pointing to specific persons
Case management and Presentation
•    Organizing to analyze and prepare to present
•    Visualization of information and big data
Online Investigations and Open Source Information
•    Google Hacks
•    Social media investigations
Covert communication methods
•    Encrypted chat/email/Internet communications
•    Identifying and breaking covert communications
Anonymous Internet
•    Tor browser, VPNs
•    Dark web investigations and topography
Cryptology and Steganography
Anti-forensics/counter-forensics techniques