The world is changing...Your computer or network is a cog in the critical cyber infrastructure whether you like it or not!
WT Forensics is dedicated to building the professionals that can protect our infrastructure. Part of that building process includes our commitment to training individuals and employees in the skills required to be safe in cyber domain.
Whether you are an individual who would like to understand how your computer stores information about you and your activities, or you want to simply know how to keep yourself safe from the myriad of threats as you surf the Internet, WT Forensics offers affordable full and half day classes.
All classes in this section are taught by members of the DC3 2010 Digital Forensics Challenge winning Williams Twins Forensics team. Classes are limited to 10 participants to insure personalized instruction.
Discovering Your Computer's Secrets8 hours$100/personLunch Provided
This course will teach you how to install and use a variety of free and shareware tools to explore the information hidden in your Windows based computer. Attendees will receive a copy of the book, "Privacy in the Digital Realm," the course handouts and a CD with all software used in the class. Attendees will get hands on practical experience in using these tools to explore a pre-configured virtual machine in a classroom environment.
Who should attend: Anyone who uses a Windows based computer who wants to learn the fundamental tools and techniques for investigating computer usage.
Keeping Secrets from Your Computer 8 Hours $100/Person Lunch Provided
This course can be used either standalone, or as a follow up to Discovering Your Computer's Secrets. The advantage of taking this as an add-on after the Discovering Your Computer's secrets is that you will understand the "why's" for the techniques that this course will teach you. Regardless, this class will teach you how to use free, and commercial tools and techniques to clean your computer's ability to tell others what you have been doing. The course will also cover methods for establishing clear Internet connections through the use of proxies, Virtual Private Networks and TOR.
Who should attend: Anyone who uses a Windows based computer who wants to learn how to keep their personal information "personal" on their computer.
Free Tools to Keep You Safe4 Hours$25/person
This course will introduce you to the variety of free tools that will help you to keep your system safe. These tools are free for personal use. Students will go through the process of installing each tool, configuring them, and then coming to an understanding of what each tool does. Attendees will receive a course handout as well as a CD with the most current version of the software tools on it.
Who should attend: Any one who uses a Windows based computer that wants to understand how to protect their computer from malware, viruses and other computer based attacks.
Advanced Hunter / Defender Courses
Advanced Anonymity Online8 Hours$200/personLunch Provided
This course is intended for advanced Internet users who desire to create Internet presences which are fully believable and verifiable but which do not give away true information about the actual user. Attendees will be taken through planning, implementation, and verification that the identities that they have created can not be traced. Techniques will include "backstopping," Virtual Private Network Software, TOR, IRC, email, and web browser agent modification.
Who should attend: Advanced Internet users who have a need to create a believable persona on the Internet.
The A Glimpse at the Darkside of the Internet4 Hours$100/person
This course is designed to show advanced Internet users how to navigate into the seamier side of the Internet safely. Internet users who do not show an appropriate understanding of computer protection, online anonymity and other skills required to stay safe will not be allowed to attend this course. Students will be shown how to search for and find the sites used by hackers and how to understand the vernacular, and customs in this underground economy.
Who should attend: Advanced Internet users who are interested in the underground Internet economy and the world of black hat hackers.
Honeypots and Malware Analysis
Open Source Digital Forensic Suites