This virtual one-day class will introduce you to the latest methods,techniques and threats posed by steganography. Students will learn how steganography has evolved, where it is going and how it is being used by criminals and terrorist organizations. Learn about the latest techniques to detect, shunt, disrupt and destroy steganography communications. Identify those using steganography and stop the leak of vital information from your organization.
Steganography Is Global Threat!
Steganography is capable of concealing the mere existence of incriminating information and/or covert communications. Steganography weapons are easy to use, and are readily available to our adversaries.
When Steganogpraphy is used in conjunction with the internet, it becomes a globally effective tool for command control communication and intelligence.
Criminals are armed with the ability to…
Conceal incriminating information
Covertly communicate with accomplices
Innocouously share large amounts of potentially dangerous information
Class begins at 9:00 a.m. and runs until 5:00 p.m. All materials will be sent to you directly prior to the class and we will hold and Q + A session the day before the class starts to ensure that the designated workstation is preconfigured correctly.
Who Should Attend:
One full day of virtual training
WetStone Certification (Students must successfully pass both written and practical exams)
Software packages are available upon request