Behind the Keyboard Workshop

From April 24, 2017 08:00 until April 25, 2017 17:00

A two-day workshop of innovative and traditional techniques to investigate computer-facilitated crimes with the intention of placing the suspects behind the keyboard.  Workshop integrates both cyber investigations (forensics) and traditional investigation methods into a complete process of working criminal investigations by thinking inside and outside the CPU.  The course includes hard copies of the Syngress books Placing the Suspect Behind the Keyboard and Hiding Behind the Keyboard.

Course is designed for general investigators (LE and PI), cybersecurity professionals (digital forensics, incident response, etc..), and attorneys litigating computer-related incidents.  Knowledge of digital forensics is not required, however, digital forensic methods will be demonstrated in portions of the course.

Course is currently full (LE ONLY), but the host is considering opening to a larger room.  To be placed on a wait list, send an email to This email address is being protected from spambots. You need JavaScript enabled to view it. with your name and telephone contact.  Notifications of wait list acceptance into the course will be no later than 7 days prior to the start of the course.

Evidence matters  
•    Collection through presentation
•    Approaches to crime scenes and decision-making charts
•    Suspect/Witness/Victim interviews
•    Asking the ‘right’ questions
It’s more than just the computer
•    Physical investigations 
•    Electronic intercepts (wiretaps, etc…)
About a person: Compiling the Complete Identity
•    Real identity 
•    Digital identities (real, fake, and anonymous)
User activity 
•    Attributing computer activity to a specific person or persons
•    Digital forensics artifacts pointing to specific persons
Case management and Presentation
•    Organizing to analyze and prepare to present
•    Visualization of information and big data
Online Investigations and Open Source Information
•    Google Hacks
•    Social media investigations
Covert communication methods
•    Encrypted chat/email/Internet communications
•    Identifying and breaking covert communications
Anonymous Internet
•    Tor browser, VPNs
•    Dark web investigations and topography
Cryptology and Steganography
Anti-forensics/counter-forensics techniques