I just finished my last event of the year 2017. I have a few training sessions and hosted presentations scheduled in 2018, but for 2017, I have completed the year with an average of more than 1 a month. Next year, my goal is to cut the number of classes and presentations in half or less...
If you'd like a presentation or training, feel free to contact me for more information. Generally, I have been limiting most of my training to internally hosted organizations, such as government agencies and corporations. However, I am open to presenting anywhere if I can meet your needs. As to some of the courses I have given, here are some of what I have presented in classrooms across the US in 2016 and 2017:
I will have a Bitcoin Forensics Course available mid-2018, both online and in the classroom.
A two-day workshop of innovative and traditional techniques to investigate computer-facilitated crimes with the intention of placing the suspects behind the keyboard. Workshop integrates both cyber investigations (forensics) and traditional investigation methods into a complete process of working criminal investigations by thinking inside and outside the CPU. The course includes hard copies of the Syngress books Placing the Suspect Behind the Keyboard and Hiding Behind the Keyboard.
Course is designed for general investigators (LE and PI), cybersecurity professionals (digital forensics, incident response, etc..), and attorneys litigating computer-related incidents. Knowledge of digital forensics is not required, however, digital forensic methods will be demonstrated in portions of the course.
• Collection through presentation
• Approaches to crime scenes and decision-making charts
• Suspect/Witness/Victim interviews
• Asking the ‘right’ questions
It’s more than just the computer
• Physical investigations
• Electronic intercepts (wiretaps, etc…)
About a person: Compiling the Complete Identity
• Real identity
• Digital identities (real, fake, and anonymous)
• Attributing computer activity to a specific person or persons
• Digital forensics artifacts pointing to specific persons
Case management and Presentation
• Organizing to analyze and prepare to present
• Visualization of information and big data
Online Investigations and Open Source Information
• Google Hacks
• Social media investigations
Covert communication methods
• Encrypted chat/email/Internet communications
• Identifying and breaking covert communications
• Tor browser, VPNs
• Dark web investigations and topography
Cryptology and Steganography