|
Good day,
Please find the DC3 Cyber Training Academy’s Monthly Bulletin for May 2025 attached. To request registration for scheduled course offerings, or to view the upcoming course schedule, please visit https://learn.dcita.edu.
Register Now: New In-Residence Courses
Managed Attribution (MA): MA is a 40-hour course that will train students in the techniques, tactics, and procedures for developing deliberate, controlled, and misleading digital footprints to support law enforcement and counterintelligence operations. Students will learn about the methodologies used by adversaries and the necessary skills, techniques, and strategies to protect sensitive information, while performing law enforcement or counterintelligence operations. This course will also teach students to proactively defend against threats while maintaining operational security and preserving the integrity of their organizations.
Online Undercover Activities (OUA): OUA is a 40-hour scenario-based training course that will develop professionals’ skills in conducting a full online undercover operation. The course provides both theory and practical training, enabling students to develop and plan an online undercover operation, create personas, manage digital footprints, engage in simulated dark web marketplaces and forums, and report their findings and activities.
Launching June 2025: Redesigned Cyber Analyst Course (CAC)
CAC is a 40-hour in-residence course that fuels cyber professionals’ critical thinking and provides analytical skills so they can interpret different types of reports, conduct internet research, identify intrusions, explore data-hiding techniques, and analyze computer systems, networks, and logs. Students explore real-world scenarios using specialized analytical tools that allow for skills practice, writing analysis reports, creating link diagrams, and completing performance exercises.
New CyberCast: Malware RATs
This CyberCast focuses on Remote Administration Toolkits, also known as RATs. It discusses their various capabilities and logical architecture and explores their history of development. A demonstration provides a crash course in the Dark Comet RAT, discussing how it can be configured and deployed to a victim’s machine, and what its capabilities are once it has been successfully deployed. Another demonstration covers various methods an investigator can use to identify whether a machine is compromised.
Approved for A+, DataSys+, Net+, Sec+, Linux+, and Cloud+.
For questions, or for any further information, please contact the DC3/CTA Registrar at DC3.CTA.Registrar@us.af.mil or 443-733-1990.
|