Preberite kaj menijo udeleženci prejšnjih konferenc.
Spoznavanje in druženje skupaj s pridobivanjem novih znanj in informacij je res najboljši način za odpiranje novih priložnosti.
Uroš Bogataj, Megalith info & media
DELAVNICA 1: ICT Forensics - Network and Operating System Forensics Investigation
This workshop gives opportunity to look at advance methods of doing forensics investigation on network traffic from malware attack and windows operating system hidden places.
Here you can learn how to:
Practical exercises in this workshop are labs based on BYOD (Bring Your Own Device) lab execution. This means that attendant must bring his own laptop and conduct lab exercises there.
Minimum requirements for lab exercises at least 35GB HDD space, 4GB RAM memory, processor enabled virtualization and installed VMware Player 7.1.2 with ability to run virtual machines and host file system with the ability to read and write files that are larger than 3 GB.
All lab exercises are done on virtual machines (Linux OS and Windows OS) that will be delivered on external media to the attendance at the beginning of the workshop or trough link for internet download 1 week before the workshop.
CAUTION: Do not store any sensitive data on your laptop since we will be accessing places on internet that might compromise your OS. If it happens then company that organize and the trainer of this workshop will not take any responsibility.
- Computer Forensics Investigation Process
- Extracting Digital Evidence from Windows OS Hidden Places
- Network Traffic Analytics for Security Incident on Malware Infection
- Hands-on Labs with Actual Forensics Tools
1. Introduction to Information and Communication Technology Forensics Investigation
Lab: Getting inside Darknet-IT Crime Services Portal
2. Operating Systems Forensics
Lab: Data Acquisition and Recovery with CAIN and HELIX3
3. Network Forensics
Lab: Investigating Network Traffic
Official trainer and author of this workshop is m-r Mane Piperevski who is security expert with over 10 years of experience and expertise in field of Ethical Hacking/Penetration Testing and Computer Forensics. He works currently as CEO and IT Security Consultant at Piperevski&Associates and he is also contributor to open software security community as OWASP Chapter Leader for Macedonia. Recently published white papers “Hacker Attacks - Undetectable attacks from trojans with reverse communication” and “Hacking Attacks - Security Threats in IPv6 networks”. Holder of numerous security certifications (C|EH, E|CSA, C|HFI, E|CIH, E|CSP .NET, MCSA, MCSE, MCITP, C|EI, MCT) and Europe highly ranged Cyber Crime instructor and trainer.
Date: 30.11.2016, 8.30-17.00 (two 15-minute coffee break, 1 hour for lunch)
Price: 297 € + 22% VAT