After a completion of the training the participant will be able to independently identify, analyse and mitigate invasive physical eavesdropping threats and learn effective strategies for detecting unknown cyber eavesdropping threats, which then they will be able to develop on their own.
Sylabus
- We will cover how to find all types of invasive physical eavesdropping devices.
- The training will mainly focus on understanding of TSCM related physics and the general technologies used to exfiltrate data from a secure facility by eavesdropping devices. By deep understanding of technologies the participants will be able to individually recognize even unknown eavesdropping devices in the future.
- Participants will learn how to detect malicious network traffic from devices (Mobile Phones, loT devices, workstations, servers).
- We will discuss advanced firmware analysis to teach participants to validate loT devices (cameras, routers etc.), if firmware is not tampered. lf the analysis shows possible tampering, we will discuss how to collect indication of compromise and threat hunt adversary.
- Another subject of discussion will be digital forensic analysis of electronic devices and introduction to cryptography, both in context of TSCM purposes.
- Last but not least, we will also discuss our experiences from real TSCM projects, world known use cases and cover tips and tricks.
If you are interested in private training or a quote, please contact us for a detailed overview of the training program, including the specific methods and techniques your team will learn. Due to the sensitive nature of Cyber TSCM Training, we cannot disclose these publicly. We provide training for both private clients and government agencies.