|
Good day,
Please find the DC3 Cyber Training Academy’s Monthly Bulletin for July 2024 attached. To request registration for scheduled course offerings, or to view the upcoming course schedule, please visit the website at https://learn.dcita.edu.
Redesigned Technology Evidence in Domestic Abuse (TEDA) Course: Live On-Demand
Technology Evidence in Domestic Abuse (TEDA) is a two-hour, self-paced, on-demand course which teaches students the fundamentals of using technology evidence in domestic abuse cases. Intended primarily for law enforcement personnel and first responders, the course content familiarizes students with causes and types of domestic abuse and presents real-life domestic abuse scenarios to emphasize that abuse through technology is not always distinct from physical violence. Students learn to recognize, collect, preserve, and analyze digital evidence, as well as increase their understanding of applicable laws.
Featured CyberCast: Indicators of Compromise (IoC)
Featured CyberCast: Indicators of Compromise (IoC) Network incident response is a key function of network defenders' role to detect, mitigate, and neutralize adversaries attempts to gain additional access into a network. Recognizing IoCs and predicting their location are key components of mitigation strategy. This CyberCast examines a common pathway of exploitation, and looks at the related IoCs and their locations.
Approved for A+, DataSys+, Network+, Security+, Linux+, and Cloud
DC3 QuickBytes
DC3 QuickBytes are short microlearning videos which provide students with quick tutorials on how to perform specific actions using a variety of different tools and techniques. Developed by DC3 Cyber Training Academy instructors and subject matter experts, topics include “How to Load a Forensic Image with Axiom,” “How to Carve a VeraCrypt Container Hash in 3 Steps,” “How to Configure Burp Suite Intercept Proxy,” as well as many more. Please view the QuickBytes playlist and future video topics at https://learn.dcita.edu.
DC3/CTA CyberCasts
Don’t forget to check out our CyberCasts. Topics like Domain Fronting; Windows Forensic Artifacts - Evidence of Program Execution; Open Source tools for Incident Response and Zeek Integration into ELK, are just a few of the one-hour Cybercasts that provide a brief overview of the latest tools and techniques. *Note: Select CyberCasts have CompTIA CEU-eligibility. For a full list, please contact the Registrar. The CyberCasts can be found on the CTA webpage under “On-Demand” at https://learn.dcita.edu.
For questions, or for any additional information, please contact the DC3/CTA Registrar at DC3.CTA.Registrar@us.af.milor 443-733-1990.
|