Description: A former digital forensics laboratory manager and examiner, Josh Brunty has over a decade of experience in the field of digital forensics & investigations. Josh is currently an Assistant Professor of Digital Forensics for the Department of Integrated Science & Technology and Forensic Science Departments at Marshall University in Huntington, WV. Prior to joining Marshall, Josh was an examiner and technical leader of digital forensics with the West Virginia State Police?s Digital Forensic Laboratory. Josh holds numerous certifications within the digital forensics discipline including: AccessData Certified Examiner (ACE), AccessData Mobile Examiner (AME), Computer Hacking Forensic Examiner (CHFI), Seized Computer Evidence Recovery Specialist (SCERS), Certified Malware Investigator, Certified Steganography Examiner, and is certified by the National Security Agency in Information Assurance Methodology (NSA-IAM). Josh has authored numerous articles on the subject of digital forensics and investigations, many appearing in publications such as Digital Forensic Investigator (DFI) News. Most recently, he co-authored the book ?Social Media Investigation for Law Enforcement? published by Elsevier/Anderson, which outlines the ever-increasing popularity of social media and its potential value as a source of evidence within an investigation. He has developed a variety of digital forensic training sessions and curriculum; including past recertification scenarios/exams for the International Association of Computer Investigative Specialists (IACIS). Josh is a member of the Mid-Atlantic Association of the High Technology Crime Investigation Association (HTCIA), the Digital-Multimedia Sciences section of the American Academy of Forensic Sciences (AAFS), the Appalachian Institute of Digital Evidence (AIDE) the West Virginia Cyber Crimes Task Force, and the West Virginia Chapter of FBI INFRAGARD.
For More Information Please Visit:- http://securewv.com/
http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2016/mainlist
Tags:
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.