|
Good day,
Please find the DC3 Cyber Training Academy’s Monthly Bulletin for June 2024 attached. To request registration for scheduled course offerings, or to view the upcoming course schedule, please visit the website at https://learn.dcita.edu.
Revised Technology Evidence in Domestic Abuse (TEDA) Curriculum: Coming Summer 2024
TEDA is a 90-minute on-line asynchronous self-paced course that provides first responders an overview of the role that technology can play in domestic abuse and violence cases. TEDA introduces critical concepts on the intersection of technology and domestic abuse and violence, including how abuse manifests, underlying dynamics of abuse, signs of escalation, relevant UCMJ articles, DoD policies, and industry best practices for the collection of digital evidence.
CyberCast: Vulnerability Scanning with Tenable Nessus
Nessus is a proprietary vulnerability scanner developed by Tenable, Inc. It works by testing each port on a computer, determining what service it is running, and then testing this service to ensure there are no vulnerabilities in it that a hacker could use to carry out a malicious attack. Some great functions of Nessus include scheduling scans and audits, detecting out-of-date files, simulating attacks, and creating reports of findings that security teams can present to stakeholders. This CyberCast helps students understand the importance of a vulnerability scanning tool in business environments to help mitigate or accept potential risks discovered.
Approved for: A+, Network+, Security+, Linux+, Cloud+
Network Intrusion Basics (NIB): On-Demand
NIB is now being offered as an on-demand course. Students are able to self-enroll in the course and complete it immediately. Please note, once enrolled in the on-demand version, students have 7 days to complete the course before the enrollment expires.
DC3 QuickBytes
DC3 QuickBytes are short microlearning videos that provide students with quick tutorials on how to perform specific actions using a variety of different tools and techniques. Developed by DC3 CTA instructors and subject matter experts, topics include “How to Load a Forensic Image with Axiom”, “How to Carve a VeraCrypt Container Hash in 3 Steps”, “How to Configure Burp Suite Intercept Proxy”, plus many more. Students can view the QuickBytes playlist on the website. For a complete list and upcoming QuickBytes, please check the website.
For questions, or for any further information, please contact the DC3/CTA Registrar at DC3.CTA.Registrar@us.af.mil or 443-733-1990.
|