2017 is over for my events!

I'll be speaking and teaching in 2018 in different areas.  Korea, UK, Singapore, Japan, and USA (Florida, California, Boston). 

If you'd like a presentation or training, feel free to contact me for more information.  Generally, I have been limiting most of my training to internally hosted organizations, such as government agencies and corporations.  However, I am open to presenting anywhere if I can meet your needs.  As to some of the courses I have given, here are some of what I have presented in classrooms across the US in 2016 and 2017:

  • Placing the Suspect Behind the Keyboard (1 and 2-day workshops)
  • X-Ways Forensics Practitioner's Guide course (2-day workshop)
  • Digital Forensics Foundations (5-day course)
  • Digital Forensics - Windows Intermediate (5-day course)
  • Digital Forensics - Mobile Devices (3-day course)
  • Open Source Intelligence/Dark Web Investigations (2-day course)
  • Covert acquisitions (2-day course)

I will have a Bitcoin Forensics Course available mid-2018, both online and in the classroom.

Behind the Keyboard Workshop

From November 03, 2017 08:00 until November 04, 2017 17:00

A two-day workshop of innovative and traditional techniques to investigate computer-facilitated crimes with the intention of placing the suspects behind the keyboard.  Workshop integrates both cyber investigations (forensics) and traditional investigation methods into a complete process of working criminal investigations by thinking inside and outside the CPU.  The course includes hard copies of the Syngress books Placing the Suspect Behind the Keyboard and Hiding Behind the Keyboard.

Course is designed for general investigators (LE and PI), cybersecurity professionals (digital forensics, incident response, etc..), and attorneys litigating computer-related incidents.  Knowledge of digital forensics is not required, however, digital forensic methods will be demonstrated in portions of the course.

Govt only course.  Email directly for registration information.

Evidence matters  
•    Collection through presentation
•    Approaches to crime scenes and decision-making charts
•    Suspect/Witness/Victim interviews
•    Asking the ‘right’ questions
It’s more than just the computer
•    Physical investigations 
•    Electronic intercepts (wiretaps, etc…)
About a person: Compiling the Complete Identity
•    Real identity 
•    Digital identities (real, fake, and anonymous)
User activity 
•    Attributing computer activity to a specific person or persons
•    Digital forensics artifacts pointing to specific persons
Case management and Presentation
•    Organizing to analyze and prepare to present
•    Visualization of information and big data
Online Investigations and Open Source Information
•    Google Hacks
•    Social media investigations
Covert communication methods
•    Encrypted chat/email/Internet communications
•    Identifying and breaking covert communications
Anonymous Internet
•    Tor browser, VPNs
•    Dark web investigations and topography
Cryptology and Steganography
Anti-forensics/counter-forensics techniques