June 7 - 8, 2007
MUFSC Hosts WetStone's:
This intense two-day course, provides students an in-depth understanding of the threat posed by the use of malicious software or (malware) along with the tools and techniques necessary to investigate incidents. The course demonstrates the tools used by insiders, criminals, terrorists and crime organizations. Students will learn how insiders and outsiders create, deploy and utilize malware for political, social and economic gain.
Classes begin at 9:00 a.m. and run until 5:00 p.m. both days. Every student has his or her own PC workstation and all training materials will be provided.
|Duration:||2 days (16 hours)|
|Time:||9:00 AM - 5:00 PM|
|Location:||Marshall University Forensic Science Center, Huntington, WV|
Upon completion of this intense two-day course, students will have a complete understanding of the threat posed by malicious software in today's digital age. Threats posed by criminals, terrorists, crime organizations, and disgruntled company insiders are some of the topics that will be covered. Students will learn how to conduct a complete malware investigation from suspicion to detection, analysis, interpretation of findings, logging of evidence, and finally to reporting of evidence.
Students will gain hands on experience with multiple categories of malicious software including wireless cracking tools, trojan horses, password crackers, steganography tools, keyloggers, botnets, and rootkits. Various laboratory exercises allow students to not only learn the proper procedures and techniques to identify and detect malicious software, but also provide students a chance to gain hands on experience using the actual malware itself. Participants will also learn how to integrate malware investigation techniques into existing tools such as Encase and FTK as well as how to conduct investigations on post-mortem and live running machines containing malware.
The course includes 4 hours of lecture, 10 hours of practical laboratory exercises and investigation, and a 2 hour written and practical exam. Students are provided with all tools and laboratory exercises installed for the lecture and hands-on portions of the class. In addition, all students will receive copies of the lecture and lab exercises. Those sitting for, and passing WetStone's written and practical exam, receive a 'Certified Malware Investigator' certificate.
- 2 Full Days of Training
(4 hours lecture, 10 hours hands-on lab)
- Attendance Certificate
- Certified Malware Investigator Certificate
(Student must successfully pass both written and practical exams)
- Software packages are available upon request