Cyber Forensics Training
Since 2001, in support of the DOS-ATA mission for anti-terrorism training, NDi has provided more than 200 training events for computer forensic labs and investigative units overseas. Led by our highly credentialed law enforcement and cyber security experts, each course trains between 10-35 personnel and lasts from 5-21 days. Courses have been held in over 27 countries.
In delivering these courses for DOS-ATA, NDi manages all related logistics, which includes the scheduling of instructors; airline ticketing; passport management; consumable item acquisition; shipping of mobile labs and materials; monitoring and maintaining the security of all instructors; managing inventory; caring for equipment; and handling return logistics post-event. NDi is currently the only vendor performing this work anywhere in the world.
Recently, NDi’s Cyber Training Program was named the ATA’s featured cyber security program.
Identification and Seizure of Digital Evidence
Developed for frontline police officers and investigators involved in securing terrorism-related crime scenes that may involve the seizure of electronic or digital evidence.
Introduction to Digital Forensics and Investigations
Focused on practical aspects of cyber incidents and computer forensics. Explores the concepts needed to respond to and investigate computer related events
Proactive Internet Investigations
Course Designed to teach computer investigators to recognize the signs indicating a terrorist is using the Internet to plan or communicate operations.
Cellular Communications Forensics Consultation
Developed for law enforcement officers. Explores the forensic skills necessary to properly seize, acquire and analyze digital evidence contained on modern cellular devices and personal digital assistants (PDAs).
Advanced Digital Forensics Consultation
Designed to provide further assistance in the ongoing development of computer investigative/ forensic unit and capabilities.
Cyber Awareness for Prosecutors
Designed to focus on issues related to motivation and trends in cyber terrorism.