Difference between revisions of "The Art of Keylogging"
(Created page with ''''The Art of Keylogging'''[http://www.wetstonetech.com/cgi-bin/shop.cgi?view,32] == == WetStone has created a unique virtualized cyber-safe environment where investigators …')
Latest revision as of 12:29, 9 October 2009
The Art of Keylogging
WetStone has created a unique virtualized cyber-safe environment where investigators and information technology professionals can experiment with key logging technologies, including both software based and hardware based. Beyond the offensive use of these tools, investigators will discover how to investigate keyloggers with varied sophistication levels. To truly get into the mind of a cyber criminal an investigator must know what they are looking for, and then deeply understand how the tools they uncover work. Establishing this can mean the difference between pulling the plug on a memory resident keyloggers, and losing all traces of evidence, or uncovering the activity needed for prosecution.
Is Someone Looking Over Your Shoulder?
Desktops without keyboards, and laptops without keys are like baseball without a bat. It is impossible to take away keyboards from computers and still be efficient and functional. The question that then surfaces is, how do we secure them? Keyboards are under attack from software and hardware based tools designed to steal the content typed on the keys. Whether infected at home or at work, keyloggers are responsible for massive amounts of identity theft and corporate leakage of data.
Who Should Attend?
▫ Forensic Investigators ▫ Local, state and federal law enforcement ▫ Private investigators ▫ IT security professionals ▫ Security auditors
Our trainers take you inside the minds of today’s criminals and students completeing the class will be able to execute a full investigation in the respective discipline. Participants proficiency in the above skills will be tested with certification exams.
1-877-WETSTONE ext 2