Nwclugadmin,
I hope everything is going well with you. Enclosed is a syllabus for a course I thought might be of interest to you and others on your team.
Data Forensics: Malware/Spyware and Phishing course– April 19, 2005 - 1 Day - Chicago, IL
This course will provide students with the knowledge and learned skills necessary to take preventive measures to eradicate malware and spyware residing within the corporate enterprise and a proactive approach to protect against phishing schemes. Students will get a strong understanding of how best practiced procedures will cut engineering life-cycles, increase awareness and eliminate the time-intensive, cost oppresive and antiquated process of “search and destroy”.
Students will explore the methodology of the most malevolent malware and spyware agents facing today’s organizations and institutions. Students will discover information-gathering techniques and preventive measures of phishing expeditions, malware definitions, signatures and data sets. Students will learn about exploited vectors and threats targeted at the kernel and router level. An emphasis will be placed on investigative procedure, registry analysis, methodology and the preservation of evidentiary integrity and shortening the time-sensitive engineering life-cycles of the “malware investigative procedure”.
* This
forensics malware/spyware and phishing course is intended for security
engineers, network administrators and tech-support services dealing with the
eradication of malware and/or spyware on a day-to-day or week-to-week basis.
This course will enable organizations to learn preventive measures and decrease
the time intensive engineering life-cycles, while increasing their knowledge and
awareness of exploitive schemes targeted at the business, civilian and
institutional communities.
Data Forensics: Malware/Spyware and Phishing course – April 19, 2005 - 1 Day - Chicago, IL
Overview
and History of Malware, Spyware and Phishing
Schemes
The
Differentiation and Definitions of Malware, Spyware and
Phishing
-What
to look for
-Performing a registry back-up
-Searching the registry and log
files
-Determinant signs and where agents
are residing
-Practical on Scanning Tools and Anti-spyware
offerings
-Task
Manager Investigation
Forensic
analysis – Defining the Methodology and
Procedure
Proactive
and Preventive Measures
System
Recovery and rebuilding
Please let me know if you, any members on your team or others may have any questions or if we can facilitate anything for you on our end.
To register, please visit our website at www.SecurityForensics.com, a click on the course title under "Training". This will take you to the registration page. If you have an interest in an on-site course for your team(s), this is available, so please let me know.
Kind
regards,
Dennis
Dennis Y.
Portney
Security Forensics,
Inc.
773-343-6335
Security Forensics, Inc. - Data forensic training, investigative forensic services, post-mortem forensic analysis, litigation-support, forensic applications, electronic discovery, message tracking, auditing and monitoring for Corporate, Legal and Law Enforcement communities. Additional ancillary and value added services to meet mandated regulatory compliance.