Defense Cyber Investigations Training Academy (DCITA) Pre-Approved Training for CompTIA Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain valid. Training submitted after the date on this document must meet this documents training requirements. Training approved in this document is based on the objectives for the following CompTIA Certifications exams. A+ - 220-801 and 220-802 Network+ - N10-005 Mobility+ - MB0-001 Security+ - SY0-401 CASP - CAS-001 DCITA CyberCasts Activity name to use when uploading CEUs into a certification record: Attended a Live Webinar CEU Required Documentation: The certified professional must upload a certificate of completion into their certification record as proof of attendance. The completion certification must contain the following information: 1. Title of the webinar 2. Name of the certified professional 3. Date the webinar was completed 4. Duration of the webinar Prerecorded webinars, webcasts, podcasts or YouTube videos are not valid for CEUs unless certified professionals can provide proof of registration or completion certificates. August 2015 DCITA v6 1
DCITA Courses Activity name to use when uploading CEUs into a certification record: Completed a Training Course Training formats accepted are Classroom-Based, Live Online, Private On-Site and Self-paced e-learning. CEU Required Documentation: The certified professional must upload a certificate of completion into their certification record as proof of attendance. The completion certification must contain the following information: 1. Name of training provider 2. Training course title 3. Name of the certified professional 4. Date the training was completed The course duration hours are to be used when entering CEU hours in a certification record. Please see the training provider course descriptions for durations. If a certified professional cannot provide proof of completion the training cannot be used for CEUs. CEU Activity Guidelines: If renewing a good for life certification the training must have been completed within 90 days prior to enrolling in the Continuing Education (CE) program or within the 3 year CE cycle. If renewing a ce certification, training must be completed within the 3 year CE cycle. August 2015 DCITA v6 2
DCITA CyberCasts CyberCast Titles A+ Network+ Mobility+ Security+ CASP Collecting System Information and APPROVED N/A N/A N/A N/A Searching Data with PowerShell The Chip-Off Approach in Forensic Data APPROVED APPROVED N/A N/A N/A Collection Introduction to Windows 8 APPROVED N/A N/A N/A N/A Using Reaver to Exploit WPS APPROVED N/A N/A N/A N/A Android Acquisition APPROVED N/A N/A N/A N/A Understanding Wireless Man-in-the - APPROVED APPROVED N/A APPROVED N/A Middle Attacks DCCI StegCarver APPROVED APPROVED N/A APPROVED N/A Easy Linux Hacks on wtpm and utmp APPROVED APPROVED N/A APPROVED N/A Malware RATs: What Investigators Need to APPROVED APPROVED N/A APPROVED N/A Know Internet Explorer 10 Artifacts in Windows 7 APPROVED N/A N/A N/A N/A and 8 using EnCase 6 Advanced NTFS Analysis APPROVED N/A N/A N/A N/A Using EnCase Forensic Imager N/A N/A N/A APPROVED N/A Using OSI Model to Teach Technology and N/A APPROVED N/A APPROVED N/A Cyber Security Installing a Hidden TrueCrypt Volume N/A N/A N/A APPROVED N/A Introduction to EnCase 7.08 N/A N/A N/A APPROVED N/A Using FTK Imager N/A N/A N/A APPROVED N/A Introduction to IPv4 Subnetting N/A APPROVED N/A APPROVED N/A Journey Through the Past: Windows APPROVED N/A N/A N/A N/A Recovery Agents Software Package Management APPROVED N/A N/A N/A N/A Introduction to Netwitness Investigator APPROVED APPROVED N/A APPROVED N/A Gaming Console Forensics APPROVED APPROVED N/A APPROVED N/A Behavior Analysis of Malicious Portable APPROVED APPROVED N/A APPROVED N/A Executables Pineapple Router Overview and Network APPROVED APPROVED N/A APPROVED N/A Security Testing Introduction to Mobile Phone Examiner N/A N/A APPROVED APPROVED N/A Plus Advanced NTFS Analysis, Part 2 APPROVED N/A N/A N/A N/A Imaging Memory in Linux N/A N/A N/A APPROVED N/A GUI Tools for Linux Computer Incident N/A N/A N/A APPROVED N/A Response Running and Analyzing Android N/A N/A APPROVED APPROVED N/A Applications Aircrack Suite N/A N/A APPROVED APPROVED N/A DCCI Stegfrensic Tools N/A N/A N/A APPROVED N/A Hack Along with Us: A Forensic Challenge N/A N/A N/A APPROVED N/A Infected Forensic Images N/A N/A N/A APPROVED N/A Introduction to Cisco Routers and Switches APPROVED APPROVED N/A APPROVED APPROVED Extracting Evidence from Metadata N/A N/A N/A APPROVED APPROVED August 2015 DCITA v6 3
CyberCast Titles A+ Network+ Mobility+ Security+ CASP Determining Files and Folders Accessed in N/A N/A N/A APPROVED N/A OS X Developing Case and Report Templates in N/A N/A N/A APPROVED N/A EnCase 7.09 Basic Configuration of Cisco Routers and APPROVED APPROVED N/A APPROVED N/A Switches Using GitHub to Install Forensic Tools in N/A N/A N/A APPROVED N/A Linux Digital Forensics, Power User Style N/A APPROVED N/A APPROVED APPROVED Using Raspberry Pi as a Firewall N/A APPROVED N/A APPROVED N/A RAID Techniques and Tips N/A N/A N/A APPROVED N/A Analyzing Commercial Spyware on Android N/A N/A N/A APPROVED APPROVED Devices A Brief History of Cryptography APPROVED APPROVED N/A APPROVED N/A Security from an Attacker s Perspective APPROVED APPROVED N/A APPROVED APPROVED Using EnCase 7.10 for IE 10 and 11 Artifacts APPROVED APPROVED N/A APPROVED APPROVED Detecting Zero-day Attacks with APPROVED APPROVED N/A APPROVED APPROVED Sysinternals Introduction to Digital Cryptography N/A N/A N/A APPROVED N/A Tracking Online Contraband Purchases N/A APPROVED N/A APPROVED APPROVED Quick Triage of a Suspected Compromised APPROVED APPROVED N/A APPROVED APPROVED System Anatomy of a Buffer Overflow APPROVED APPROVED N/A APPROVED APPROVED Cell Site Analysis APPROVED APPROVED N/A APPROVED APPROVED Advanced Identification and Attribution of APPROVED APPROVED N/A APPROVED APPROVED Malware Google for Investigators APPROVED APPROVED N/A APPROVED APPROVED Under-the-radar System Exploitation APPROVED APPROVED N/A APPROVED APPROVED Using Dshell for Network Investigators APPROVED APPROVED N/A APPROVED APPROVED Exploring the Wide World of IPv6 APPROVED APPROVED N/A APPROVED APPROVED Real-time Large Data Acquisitions in Linux APPROVED APPROVED N/A APPROVED APPROVED Exploring the Wide World of IPv6, Part 2 APPROVED APPROVED N/A APPROVED APPROVED X-Ways Forensics: A Live Demonstration APPROVED APPROVED N/A APPROVED APPROVED Mac Yosemite Investigations APPROVED APPROVED N/A APPROVED APPROVED Public Key Infrastructure Overview APPROVED APPROVED N/A APPROVED APPROVED Command-line SSL Tricks APPROVED APPROVED N/A APPROVED APPROVED Network Security Monitoring Using Security Onion APPROVED APPROVED N/A APPROVED APPROVED August 2015 DCITA v6 4
DCITA Courses Course Titles A+ Network+ Mobility+ Security+ Storage+ CASP Introduction to Networks and Computer Hardware (INCH) Computer Incident Responders Course (CIRC) Forensics and Intrusions in a Windows Environment (FIWE) Forensics and Intrusions in a Linux Environment (FILE) Linux Incident Response Fundamentals (LIRF) Introduction to Cyber Investigations (ICI) Live Network Investigations (LNI) Windows Forensic Examinations EnCase (WFE- E) Windows Forensic Examinations Forensic Toolkit (WFE-FTK) Advanced Forensic Concepts (AFC) Deployable Forensics (DEF) Network Monitoring Course (NMC) Macintosh Forensic Examinations (MCFE) Wireless Technology (WT) N/A APPROVED N/A N/A N/A N/A Linux Intermediate Fundamentals (LIF) Large Data Set Acquisitions (LDSA) Introduction to Mobile Devices (IMD) Online Undercover Techniques (OUT) Network Intrusions Basics (NIB) APPROVED N/A N/A N/A N/A N/A APPROVED N/A N/A N/A APPROVED N/A APPROVED N/A APPROVED APPROVED N/A N/A N/A APPROVED N/A APPROVED N/A N/A August 2015 DCITA v6 5
Course Titles A+ Network+ Mobility+ Security+ Storage+ CASP Introduction to Log Analysis (ILA) Introduction to Malware Lite Cyber Insider Threat Analysis (CITA) Cyber Threats and Techniques Seminar (CTTS) Network Intrusions Techniques (NIT) Introduction to Cyber Insider Threat (ICIT) Managing Cyber Investigations Units (MCIU) Penetration Testing for Investigators (PTI) Practical Cyber Analysis (PCA) Windows Incident Response Fundamentals (WIRF) Windows 8 Forensics (W8F) APPROVED N/A N/A APPROVED N/A N/A Fundamentals of Networking (FN) Cyber Analyst Course (CAC) APPROVED N/A N/A APPROVED N/A N/A Digital Data Protection (DDP) APPROVED APPROVED APPROVED APPROVED N/A N/A Introduction to Malware (IMA) Cyber Security Fundamentals (CSF) Windows Forensic Examinations EnCase- Counterintelligence (WFE-E- CI) APPROVED APPROVED N/A APPROVED APPROVED APPROVED APPROVED N/A N/A APPROVED N/A APPROVED August 2015 DCITA v6 6