Phone: 412-802-8000 | Fax: 412-802-8510|


Training 2018-09-27T13:18:37+00:00

Cyber Intelligence Analysis Training

In 2017, the NCFTA launched its formal training program to better equip researchers with the tools necessary for identifying and combating the various threats that exist to their organizations.  In our first year of offerings, we conducted dozens of courses at seven locations and 2 webinars reaching nearly 900 individuals.  For 2018, we are continuing to build on this success by improving our existing courses as well as adding additional training opportunities both online and in person that are competitively priced. All future net proceeds from our training initiative will be earmarked for our soon to be announced Cyber Scholars Program which will provide scholarships to deserving students pursuing a degree in cybersecurity or related field of study.

Our courses are very flexible in that we can tailor our training for your agency or businesses needs.  If interested in learning more, please contact:

Beginner Course Description

The National Cyber-Forensics and Training Alliance (NCFTA) offers training courses on the current cyber-threat landscape on both the clearnet and the dark web to law enforcement, industry and academia. This training course combines lectures and hands-on work with NCFTA personnel.

This immersive course is based on the current cyber criminal threat landscape as seen on both the clear net and dark web, and will provide attendees with a basic understanding of cyber threats, who the threat actors are, how they operate, how to conduct basic online investigations, how to interact online without compromising yourself, and how to become operational across both the clear net and dark web. This training will be hands-on, with attendees working directly with NCFTA personnel. Attendees will become familiar with a variety of open source tools and how to leverage those tools to assess and profile international threat actors. There are no prerequisites for this training.

Learning Objectives

  • Understand the ongoing cyber threat
  • Review NCFTA process for building a machine for conducting online research
  • Understand the TOR network, how it works, and how to access it; also, familiarize students with I2P and Freenode
  • Find and navigate the ‘dark web’ forums/marketplaces using the TOR network
  • Conduct online research to identify threats to your organization
  • Create a target profile report through the use of various research techniques/tools
  • Learn fundamentals in interacting online through NCFTA-guided hands-on exercises
  • Create and maintain research accounts, employ basic encryption techniques in order to communicate online
  • Understand how to create a bitcoin wallet, purchase bitcoins/other crypto currencies, and make purchases using crypto currencies
  • Develop intelligence reporting based on information gathered

Advanced Course Description

This advanced, immersive course expounds upon the skills and fundamentals taught in our Introductory Course. The course will provide attendees with a more in-depth understanding of the online criminal ecosystem, beginning with how breaches occur up to how the data is monetized.   The training will be mostly hands-on, beginning with building the research machine. Additionally, attendees will be familiarized with open source and commercial tools and learn to leverage the tools to assess potential threat actors. Each module will have a task for attendees to accomplish.

Learning Objectives

  • Understand the process for building a research machine, to include installing a VM
  • Understand the life cycle of monetizing compromised data, beginning with the actual breach
  • Develop intelligence reporting based on information gathered
  • Interact online using various P2P chat platforms
  • Utilize software for encrypting and decrypting information
  • Explore alternate crypto-currencies

Our Training Partners: