Cyber Capacity
Building Programs
United States foreign policy often relies on effective foreign assistance programs to strengthen our national security and the rule of law globally, to counter terrorism, combat illicit drug and human trafficking, and prevent the proliferation of chemical, biological, and other hazardous materials. At the same time, today’s world is increasingly digital. Internet usage is pervasive. Mobile devices and computers deliver instant access to information and technology systems, while also enabling criminal, terrorist, trafficking, and other threats to the United States. Training is a significant part of most assistance programs.
Cybervance provides Cyber Capacity Building services to support this knowledge and skills transfer. This includes assessments, training, equipment grants, mentoring and more to implement United States foreign policy. Our process-based, structured programming is designed to meet goals and objectives with measured progress and outcomes to inform all stakeholders.
Cyber Program Success
Cybervance has a long history of supporting USG agencies in areas related to international capacity building programs. From foreign assistance capacity building to collaboration with partner nations, Cybervance services are comprehensive and turnkey. We provide initial assessments and planning, training across multiple cyber disciplines, equipment installations, operational support and mentoring. All of Cybervance’s services are supported by insightful reporting for program stakeholders needing to stay informed about key issues in plain English, not cyber-speak. Our logistics function handles everything needed for program success, including all equipment procurements, shipping, customs and duties processing, travel, and in-country event support.
Our services are tailored for international delivery. Our team is adept at making in-country, real-time adjustments to address regional and situational dynamics. We understand that cyber programming is part of a larger diplomatic mission, and we focus on achieving tangible programming results.
The Cybervance programming support model is customized for each country’s needs. Training courses build upon each other, thereby advancing knowledge, expertise, and cybersecurity capacity in employees and agencies over time. Many courses incorporate equipment and tools and lead to industry recognized certification. Mentorship and train-the-trainer programming reinforce operational capacity and lead to sustainment.
With an extensive background in law enforcement, our team brings specialized service delivery to cyber-related programs with a criminal or counterterrorism nexus.
From security operations staff to threat hunters, Cybervance Vertex can be harnessed to strengthen individual and joint team response—improving operational outcomes. Some of the many ways to leverage Cybervance Vertex include:
Experiential Learning – Hands-on scenario training matched to an organization’s specific threat landscape and infrastructure.
Assessment and Evaluation – Measure key performance indicators (KPIs) such as response time, incident containment, and resolution accuracy to identify areas for improvement.
Training and Skill Development – Hone skills responding to various cyber threats in a safe and controlled setting.
Compliance and Security Controls – Simulated cyber attacks helps teams identify weaknesses and strengthen their security posture.
Reporting – Exercise and activity results enrich reports and inform program stakeholder planning.
Training Features
Cybervance courses are professionally developed. Our Instructional System Design team ensure materials are always current and mapped to defined learning goals and objectives. Select training features include:
Assessments - Our assessments measure application of knowledge, skills performance levels, and the readiness of participants to independently perform techniques and procedures from training. We analyze assessment results to quantify training effectiveness.
Reporting - Our reports include expert insights and recommendations supported by tools to report participant performance levels after each training and track performance from class to class to show progress.
Tailored - We customize our courses to meet the needs of each participant or agency. This means designing scenarios using relevant situations, scalable exercises, and industry-leading tools and equipment.
Lab Guides - Our guides provide step-by-step instructions with screen captures on how to perform procedures. These job aids are excellent references after the course and reinforce proper procedures.
Cybervance Training Courses
Forensics
Comprehensive curriculum enabling forensically sound digital device collection, processing, and analysis. Identification and Collection of Digital Evidence for Field Investigators (FRFI-100) Introduction to Computer Hardware (FRFI-105) Forensic Fundamentals (FREP-100) Digital Forensic Acquisition Tools (FREP-110) Digital Forensic Analysis Tools (FREP-115) Windows Forensics (FREP-200) Linux Forensics (FREP-205) Memory Analysis (FREP-300) Mentorship: Forensics (FREP-MNT) Fundamentals of Mobile Device Forensics (FRMO-100) Advanced Mobile Device Forensics (FRMO-200) Mentorship: Mobile Device Forensics (FRMO-MNT) Digital Evidence Acquisition and Rapid Response (FRDV-200) Digital Video Recovery and Analysis (FRDV-205)
Incident Response
Entry to advanced course progression covering log acquisition, static analysis, dynamic analysis, ransomware and more. Introduction to Incident Response Investigations (IRDE-100) Log Acquisition (IRDE-200) Log Analysis (IRDE-205) Incident Response and Threat Hunting for Investigators (IRDE-300) Mentorship: Incident Response (IRDE-MNT) Malware Investigations: Static Analysis (IRMA-100) Malware Investigations: Dynamic Analysis (IRMA-200) Malware Investigations: Mobile Devices (IRMA-300) Mentorship: Malware (IRMA-MNT) Ransomware Investigations (IRRW-375)
Network Investigations
Fundamental courses introduce key network technologies, advanced courses enable comprehensive network intrusion investigations. Network Fundamentals (NWIN-100) Network Forensics (NWIN-110) Network Intrusion Fundamentals (NWIN-200) Network Intrusion Investigations (NWIN-300) Mentorship: Network Investigations (NWIN-MNT)
Online Investigations
Course series navigates social media and the dark web complexities to enable effective online investigations. Online Investigations (ONIN-100) Online Investigations: Social Media (ONIN-200) Mentorship: Online Investigations (ONIN-MNT) Online Investigations: Darkweb (ONIN-300) Mentorship: Darkweb (ONDW-MNT)
Cryptocurrency
Foundational training leads to more advanced investigation courses focused on tracing an attribution, fraud and scams. Cryptocurrency Introduction (CPTC-100) Cryptocurrency: Tracing (CPTC-200) Cryptocurrency: Fraud and Scams (CPTC-300) Mentorship: Cryptocurrency (CPTC-MNT)
Cyber Defense
Progressive curriculum designed to protect the enterprise with courses for network users and cyber defenders covering Zero Trust Architecture, cloud security, and more. Cyber Defense Awareness: Network Users (CDLE-100) Cyber Defense Awareness: Leadership (CDLE-105) Cyber Defense (CDLE-200) Zero Trust Architecture Awareness (CDLE-205) Cloud Security (CDLE-210) Triage and Endpoint Forensics (CDLE-215) Mentorship: Cyber Defense (CDLE-MNT)
Management
Courses designed to support operational management from standard operating procedures to internal training programs. Cyber Unit Initial Assessment (MGCU-000) Cyber Unit Management Consultation (MGCU-200) Mentorship: Cyber Unit Management (MGCU-MNT) Standard Operating Procedures Workshop (MGSP-200) Mentorship: Standard Operating Procedures (MGSP-MNT) Cyber Academy Curriculum Development (MGCD-200) Mentorship: Cyber Academy Curriculum Development (MGCD-MNT)
Executive & Legal
Specialized cyber courses for leadership and legal professionals to raise awareness and foster fluency in today’s technologies. Cyber Judicial Workshop (ELCW-100) Cyber Prosecution Workshop (ELCW-105) Artificial Intelligence in Crime and Policing: Challenges and Opportunities (ELAI-100) Cyber-Enabled Terrorism and Emerging Threats (ELCT-100) Network Intrusion (ELNI-100)