The Cloud. From email to storage, to social media and computing; we use it in our everyday lives and it impacts all aspects of technology. What started out as simple online storage has grown and expanded, and cloud computing today forms the basis for performing powerful processing capabilities at a fraction of traditional equipment costs. While there are now many Cloud providers, one question remains: Is the Cloud truly secure? What were to happen if a data breach in the Cloud occurred, and more importantly, what information will the security professional need to know in order to conduct a forensics investigation?
The focus of this training will be two-fold; first, to provide a high-level cloud-agnostic overview of Cloud computing, to identify some of its risks, and explore some of the tools and techniques that are used during a cloud-based digital forensics investigation. Second, students will form into teams and battle it out in a CTF-style challenge to test their comprehension of the material and their skill sets by investigating a digital image of a Cloud-based server, searching for "flags" to redeem in order to earn points and compete for some sweet prizes from our friends at No Starch Press!