Defense Cyber Investigations Training Academy (DCITA) Pre-Approved Training for CompTIA Continuing Education Units (CEUs)



Similar documents
Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs)

Pluralsight Training Pre-Approved for CompTIA CEUs

CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs)

IT Networking and Security

EC-Council Ethical Hacking and Countermeasures

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

IT Networking and Security

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

CRYPTUS DIPLOMA IN IT SECURITY

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

ASK PC Certified Information Systems Security Expert - CISSE

Security+ P a g e 1 of 5. 5-Day Instructor Led Course

CompTIA Security+ (Exam SY0-410)

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Course Title: Course Description: Course Key Objective: Fee & Duration:

Security Intelligence Services. Cybersecurity training.

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

30 Independent Study. 60 (e.g. lectures, seminars and supervised group activity)

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Course overview. CompTIA A+ Certification (Exam ) Official Study Guide (G188eng verdraft)

INFORMATION SECURITY TRAINING CATALOG (2015)

Minnesota State Community and Technical College Detroit Lakes Campus

Impact of Digital Forensics Training on Computer Incident Response Techniques

Access FedVTE online at: fedvte.usalearning.gov

CyberNEXS Global Services

Information Technology Cluster

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill

CompTIA Security+ In this course, you will implement, monitor, and troubleshoot infrastructure, application, information, and operational security.

Certified Cyber Security Analyst VS-1160

External Supplier Control Requirements

Jibran Ilyas DIRECTOR

NETWORK SECURITY (W/LAB) Course Syllabus

Robotics Core School 1

2016 Course Release Schedule Updated 12/22/2015

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Computer Hacking Forensic Investigator v8

Hack Proofing Your Organization

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

For more information, please contact Anne Arundel Community College s Center for Workforce Solutions at

Defensible Strategy To. Cyber Incident Response

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Bellevue University Cybersecurity Programs & Courses

EC Council Certified Ethical Hacker V8

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

CompTIA Network+ (Exam N10-005)

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Detailed Description about course module wise:

Network Intrusion Analysis (Hands-on)

Bachelor of Information Technology (Network Security)

CompTIA Continuing Education Program and Certification Renewal Policy

IT and Cyber Security Training Courses

Certified Ethical Hacker Exam Version Comparison. Version Comparison

The Incident Response Playbook for Android and ios

Cyber Exercises, Small and Large

InfoSec Academy Forensics Track

Skillsoft Pre-Approved for CompTIA CEUs

Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE

GFSU Certified Cyber Crime Investigator GFSU-CCCI. Training Partner. Important dates for all batches

Protecting critical infrastructure from Cyber-attack

Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

Brandman University. School of CCNA

SANS Top 20 Critical Controls for Effective Cyber Defense

Looking at the SANS 20 Critical Security Controls

Course Title: Penetration Testing: Network & Perimeter Testing

CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security

The Business Case for Security Information Management

INTRUSION PREVENTION SYSTEMS: FIVE BENEFITS OF SECUREDATA S MANAGED SERVICE APPROACH

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

Cisco Advanced Services for Network Security

Build Your Own Security Lab

Digital Forensic Techniques

Frontiers in Cyber Security: Beyond the OS

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Endpoint protection for physical and virtual desktops

CSI Crime Scene Investigations

Cyber Defense Operations Graduate Certificate

Jumpstarting Your Security Awareness Program

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

InfoSec Academy Pen Testing & Hacking Track

Curran, K. Tutorials. Independent study (including assessment) N/A

[CEH]: Ethical Hacking and Countermeasures

E M P I R E C O L L E G E

Introduction to Cybersecurity Overview. October 2014

Logging In: Auditing Cybersecurity in an Unsecure World

5 Steps to Advanced Threat Protection

Security + Certification (ITSY 1076) Syllabus

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Information Technology Policy

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

Page: Designed & Executed By: Presents Cyber Security Training

Transcription:

Defense Cyber Investigations Training Academy (DCITA) Pre-Approved Training for CompTIA Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain valid. Training submitted after the date on this document must meet this documents training requirements. Training approved in this document is based on the objectives for the following CompTIA Certifications exams. A+ - 220-801 and 220-802 Network+ - N10-005 Mobility+ - MB0-001 Security+ - SY0-401 CASP - CAS-001 DCITA CyberCasts Activity name to use when uploading CEUs into a certification record: Attended a Live Webinar CEU Required Documentation: The certified professional must upload a certificate of completion into their certification record as proof of attendance. The completion certification must contain the following information: 1. Title of the webinar 2. Name of the certified professional 3. Date the webinar was completed 4. Duration of the webinar Prerecorded webinars, webcasts, podcasts or YouTube videos are not valid for CEUs unless certified professionals can provide proof of registration or completion certificates. August 2015 DCITA v6 1

DCITA Courses Activity name to use when uploading CEUs into a certification record: Completed a Training Course Training formats accepted are Classroom-Based, Live Online, Private On-Site and Self-paced e-learning. CEU Required Documentation: The certified professional must upload a certificate of completion into their certification record as proof of attendance. The completion certification must contain the following information: 1. Name of training provider 2. Training course title 3. Name of the certified professional 4. Date the training was completed The course duration hours are to be used when entering CEU hours in a certification record. Please see the training provider course descriptions for durations. If a certified professional cannot provide proof of completion the training cannot be used for CEUs. CEU Activity Guidelines: If renewing a good for life certification the training must have been completed within 90 days prior to enrolling in the Continuing Education (CE) program or within the 3 year CE cycle. If renewing a ce certification, training must be completed within the 3 year CE cycle. August 2015 DCITA v6 2

DCITA CyberCasts CyberCast Titles A+ Network+ Mobility+ Security+ CASP Collecting System Information and APPROVED N/A N/A N/A N/A Searching Data with PowerShell The Chip-Off Approach in Forensic Data APPROVED APPROVED N/A N/A N/A Collection Introduction to Windows 8 APPROVED N/A N/A N/A N/A Using Reaver to Exploit WPS APPROVED N/A N/A N/A N/A Android Acquisition APPROVED N/A N/A N/A N/A Understanding Wireless Man-in-the - APPROVED APPROVED N/A APPROVED N/A Middle Attacks DCCI StegCarver APPROVED APPROVED N/A APPROVED N/A Easy Linux Hacks on wtpm and utmp APPROVED APPROVED N/A APPROVED N/A Malware RATs: What Investigators Need to APPROVED APPROVED N/A APPROVED N/A Know Internet Explorer 10 Artifacts in Windows 7 APPROVED N/A N/A N/A N/A and 8 using EnCase 6 Advanced NTFS Analysis APPROVED N/A N/A N/A N/A Using EnCase Forensic Imager N/A N/A N/A APPROVED N/A Using OSI Model to Teach Technology and N/A APPROVED N/A APPROVED N/A Cyber Security Installing a Hidden TrueCrypt Volume N/A N/A N/A APPROVED N/A Introduction to EnCase 7.08 N/A N/A N/A APPROVED N/A Using FTK Imager N/A N/A N/A APPROVED N/A Introduction to IPv4 Subnetting N/A APPROVED N/A APPROVED N/A Journey Through the Past: Windows APPROVED N/A N/A N/A N/A Recovery Agents Software Package Management APPROVED N/A N/A N/A N/A Introduction to Netwitness Investigator APPROVED APPROVED N/A APPROVED N/A Gaming Console Forensics APPROVED APPROVED N/A APPROVED N/A Behavior Analysis of Malicious Portable APPROVED APPROVED N/A APPROVED N/A Executables Pineapple Router Overview and Network APPROVED APPROVED N/A APPROVED N/A Security Testing Introduction to Mobile Phone Examiner N/A N/A APPROVED APPROVED N/A Plus Advanced NTFS Analysis, Part 2 APPROVED N/A N/A N/A N/A Imaging Memory in Linux N/A N/A N/A APPROVED N/A GUI Tools for Linux Computer Incident N/A N/A N/A APPROVED N/A Response Running and Analyzing Android N/A N/A APPROVED APPROVED N/A Applications Aircrack Suite N/A N/A APPROVED APPROVED N/A DCCI Stegfrensic Tools N/A N/A N/A APPROVED N/A Hack Along with Us: A Forensic Challenge N/A N/A N/A APPROVED N/A Infected Forensic Images N/A N/A N/A APPROVED N/A Introduction to Cisco Routers and Switches APPROVED APPROVED N/A APPROVED APPROVED Extracting Evidence from Metadata N/A N/A N/A APPROVED APPROVED August 2015 DCITA v6 3

CyberCast Titles A+ Network+ Mobility+ Security+ CASP Determining Files and Folders Accessed in N/A N/A N/A APPROVED N/A OS X Developing Case and Report Templates in N/A N/A N/A APPROVED N/A EnCase 7.09 Basic Configuration of Cisco Routers and APPROVED APPROVED N/A APPROVED N/A Switches Using GitHub to Install Forensic Tools in N/A N/A N/A APPROVED N/A Linux Digital Forensics, Power User Style N/A APPROVED N/A APPROVED APPROVED Using Raspberry Pi as a Firewall N/A APPROVED N/A APPROVED N/A RAID Techniques and Tips N/A N/A N/A APPROVED N/A Analyzing Commercial Spyware on Android N/A N/A N/A APPROVED APPROVED Devices A Brief History of Cryptography APPROVED APPROVED N/A APPROVED N/A Security from an Attacker s Perspective APPROVED APPROVED N/A APPROVED APPROVED Using EnCase 7.10 for IE 10 and 11 Artifacts APPROVED APPROVED N/A APPROVED APPROVED Detecting Zero-day Attacks with APPROVED APPROVED N/A APPROVED APPROVED Sysinternals Introduction to Digital Cryptography N/A N/A N/A APPROVED N/A Tracking Online Contraband Purchases N/A APPROVED N/A APPROVED APPROVED Quick Triage of a Suspected Compromised APPROVED APPROVED N/A APPROVED APPROVED System Anatomy of a Buffer Overflow APPROVED APPROVED N/A APPROVED APPROVED Cell Site Analysis APPROVED APPROVED N/A APPROVED APPROVED Advanced Identification and Attribution of APPROVED APPROVED N/A APPROVED APPROVED Malware Google for Investigators APPROVED APPROVED N/A APPROVED APPROVED Under-the-radar System Exploitation APPROVED APPROVED N/A APPROVED APPROVED Using Dshell for Network Investigators APPROVED APPROVED N/A APPROVED APPROVED Exploring the Wide World of IPv6 APPROVED APPROVED N/A APPROVED APPROVED Real-time Large Data Acquisitions in Linux APPROVED APPROVED N/A APPROVED APPROVED Exploring the Wide World of IPv6, Part 2 APPROVED APPROVED N/A APPROVED APPROVED X-Ways Forensics: A Live Demonstration APPROVED APPROVED N/A APPROVED APPROVED Mac Yosemite Investigations APPROVED APPROVED N/A APPROVED APPROVED Public Key Infrastructure Overview APPROVED APPROVED N/A APPROVED APPROVED Command-line SSL Tricks APPROVED APPROVED N/A APPROVED APPROVED Network Security Monitoring Using Security Onion APPROVED APPROVED N/A APPROVED APPROVED August 2015 DCITA v6 4

DCITA Courses Course Titles A+ Network+ Mobility+ Security+ Storage+ CASP Introduction to Networks and Computer Hardware (INCH) Computer Incident Responders Course (CIRC) Forensics and Intrusions in a Windows Environment (FIWE) Forensics and Intrusions in a Linux Environment (FILE) Linux Incident Response Fundamentals (LIRF) Introduction to Cyber Investigations (ICI) Live Network Investigations (LNI) Windows Forensic Examinations EnCase (WFE- E) Windows Forensic Examinations Forensic Toolkit (WFE-FTK) Advanced Forensic Concepts (AFC) Deployable Forensics (DEF) Network Monitoring Course (NMC) Macintosh Forensic Examinations (MCFE) Wireless Technology (WT) N/A APPROVED N/A N/A N/A N/A Linux Intermediate Fundamentals (LIF) Large Data Set Acquisitions (LDSA) Introduction to Mobile Devices (IMD) Online Undercover Techniques (OUT) Network Intrusions Basics (NIB) APPROVED N/A N/A N/A N/A N/A APPROVED N/A N/A N/A APPROVED N/A APPROVED N/A APPROVED APPROVED N/A N/A N/A APPROVED N/A APPROVED N/A N/A August 2015 DCITA v6 5

Course Titles A+ Network+ Mobility+ Security+ Storage+ CASP Introduction to Log Analysis (ILA) Introduction to Malware Lite Cyber Insider Threat Analysis (CITA) Cyber Threats and Techniques Seminar (CTTS) Network Intrusions Techniques (NIT) Introduction to Cyber Insider Threat (ICIT) Managing Cyber Investigations Units (MCIU) Penetration Testing for Investigators (PTI) Practical Cyber Analysis (PCA) Windows Incident Response Fundamentals (WIRF) Windows 8 Forensics (W8F) APPROVED N/A N/A APPROVED N/A N/A Fundamentals of Networking (FN) Cyber Analyst Course (CAC) APPROVED N/A N/A APPROVED N/A N/A Digital Data Protection (DDP) APPROVED APPROVED APPROVED APPROVED N/A N/A Introduction to Malware (IMA) Cyber Security Fundamentals (CSF) Windows Forensic Examinations EnCase- Counterintelligence (WFE-E- CI) APPROVED APPROVED N/A APPROVED APPROVED APPROVED APPROVED N/A N/A APPROVED N/A APPROVED August 2015 DCITA v6 6