|Course Length:1 Day|
|Upcoming Course Dates & Locations:||Register by August 2nd!|
|September 10, 2010||Missassiuga, Ontario, Canada|
|September 29, 2010||Warsaw, Poland|
|October 27, 2010||Gaithersburg, MD|
Criminals utilize Peer to Peer technologies to communicate, share information and contraband. In addition, malicious software such as Botnets, Zombies and Trojans utilize these protocols for command and control once target computers have been compromised. During this one day emersion class students will use the latest tools, techniques and methodologies to extract and examine information from P2P activities.
Who Should Attend?
What Will You Learn?
Digital forensic investigators often find peer-to-peer file sharing software present on the images of hard drives they examine. Investigators must determine what P2P software is present, where the associated information is stored, retrieve the information from the appropriate directories, and then analyze the results. This training course presents techniques for P2P investigations using manual techniques and introduces the use of P2P Marshal, a new, automated tool for the detection and analysis of peer-to-peer usage.
What Will You Get?
As a student you will bring home with you: