CSS Cascade Menu by Css3Menu.com

CSS Cascade Menu by Css3Menu.com


At Cyber Diligence we like to share our wealth of knowledge and experience with clients. We provide training services to a variety of people ranging from legal professionals to employees of organizations to those working in governmental organizations. During our law enforcement careers we have developed and taught courses on IT Security, Cyber Crime Investigations, Computer Forensics, Corruption Prevention, and Investigations. We have provided training to allied intelligence and national police agencies.

One of our commonly requested training sessions is designed to educate the members of an organization on prevalent cyber threats that target them. We educate them on how to prevent themselves from falling into traps posed by competitors or malicious intruders. This training is dedicated to preventing human error from undermining an otherwise robust information security infrastructure. Because training cannot be a one-size-fits-all approach, we provide several different training programs to address different training needs. 
Computer Crime Investigations Training

Typically designed for a law enforcement agency and taught on site, the course duration is usually one week. We discuss prevailing cyber crime trends and effective investigative methodologies.  Students will be made familiar with all aspects of the Internet, Internet Protocols, Networks, Network Components, Email, Mobile Devices, Digital Crime Scenes, Incident Response to Insider Threats, Incident Response to External Intrusions, Identification/Collection of Digital Evidence, Covert Operations, How to Investigate APT's, Cyber Investigative Techniques, Undercover Operations, etc.

Computer Forensics Training

This is a week-long training course primarily designed for law enforcement personnel. The students are made familiar with various forensic tools, discussing their applications, as well as their strengths and weaknesses. Students will be trained on the processing of digital crime scenes.  They will be instructed on the preservation, collection, processing, and reporting of digital evidence.  Techniques and analysis methodologies are the focus of this course. As such, this is not a course specifically demonstrating how to use certain tools, but a training program concentrating on investigative methodologies and techniques.

Digital Forensics for Legal Professionals

Computers can be used to commit an unlawful act or may contain evidence relating to an unlawful act. Computers may contain evidence that may be exceedingly relevant to the litigation. Unfortunately, many legal professionals lack the technical knowledge to understand when and where relevant evidence may be found on a digital device, as well as what is technically possible and what is not. This course is not designed to be technical training where we attempt to teach a legal professional how to perform a forensic examination. Rather, the purpose of this class is to make the attendee aware of the different types of evidence that may exist on a digital device and how they can be recovered and interpreted. We will discuss disk structure, file systems, interpretation of metadata, log files, file deletion and recovery, email servers, email clients, file servers, networks, spoliation issues, forensic tools and techniques, mobile forensics, etc.

IT Department Management , Administrators and Staff Training

This training is technical in nature and should be offered to all levels of the IT staff within your organization. Building on the technical knowledge of your IT staff, seasoned Cyber Diligence Forensic/Cyber-Security Investigators will convey to your staff, in the technical language of the IT Department, knowledge about the risks, vulnerabilities and countermeasures necessary for your staff to: (1) protect confidential and private information, (2) ensure the availability of information to authorized users in a timely manner, and (3) protect the integrity of your information. In addition, the IT staff will be trained on how to respond to suspected intrusions. We will discuss every step of an incident response from initial detection to eradication.

Ultimately it is the IT Department and its management that has the responsibility of complying with IT Security Awareness and Training requirements established for their authorized corporate users.









Corruption Prevention and Investigation Training

The senior team at Cyber Diligence consists of former members of the NYPD Internal Affairs Bureau and collectively possesses over 50 years of experience involving corruption investigations and prevention. We provide consulting and training services to Sovereign Nations, Government Organizations, and Private Corporations on corruption prevention and investigations. We have implemented policies and helped write laws, established corruption fighting entities, such as a version of Internal Affairs and the Inspector General’s Office geared towards a particular nation. Even though we are mainly a DF firm, we also have very high qualifications in terms of corruption prevention investigations.

Non-Technical End-User Awareness Training

An uninformed employee is usually your weakest link. The corporate end-users are the largest audience in any organization and are the single most important group of people who can help to reduce unintentional errors and IT vulnerabilities.

Information Security Training, in non-technical terms, produces highly-aware employees who are capable of proactive response and who possess the skill sets to competently perform their job responsibilities within your organization. Training is critical to the overall security of your organization and reinforces your employees’ accountability to your corporate compliance policies when it comes to internet use, information technology, and corporate information. Making executives, administrators, and end-users aware of their security responsibilities and teaching them the correct practices so that they (and the company) will not fall victim to cyber-crimes is the focus of this training service. This type of training helps your employees change and adapt their behavior to conform to your best security practices.
Cyber Diligence provides specialized training for all employee levels and prepares your employees to recognize known dangers, turning them into highly-educated computer users who are stronger links in your Cyber Security chain of protection.  

Awareness is possibly the most important computer security measure any organization can take!