ASI Hosted Training
Courses are typically conducted during normal business hours at ASI’s
Training Facility in Reston, VA. Breakfast and lunch are provided.
ASI hosted training is charged on a per-attendee basis, with group discounts available.
Need Training On-Site?
Use Our Customer Hosted Option
Customer hosted training may be scheduled by request to accommodate groups or special needs. For this option, please ensure availability of a private classroom.
This training is charged on a per-session basis, plus instructor travel/lodging. Each session is limited to a maximum of 30 attendees.
Contact ASI today to register for classes.
Proactive Security Solutions
Cyber Threat Awareness Training
Course Name: Cyber Threat Awareness Training
Course Length: 2 days / 16 hours
This instructor-led course is designed for the business person traveling and working in domestic and international locations. Course material focuses on the risks associated with the use of computers and telecommunications devices in various types of threat environments.
The training provides an overview of digital forensics and exploitation tools, as well as cyber infection and social engineering techniques that are used to target individuals and gain access to sensitive information on electronic devices.
Methods that can be used to minimize exposure and reduce the risk of attack are discussed and demonstrated in the classroom.
Attendees will obtain familiarization with information security threat categories inherent to use of computers and telecommunications devices, including:
- Digital Litter – Understand how your data files, programs, emails, contacts, calendars, photos, VoIP call logs, browsing artifacts, temporary files, search history, jump lists, online transactions, registries, and online gaming can be easily exploited to betray your identity and personal behaviors to external parties.
- Digital Forensics – Learn how forensic analysis of your unallocated file space can be used to recover “deleted” files on your devices. Recognize how easily-overlooked metadata associated with your documents and pictures can provide unintended user information and insight into sensitive files.
- Online Presence – Recognize the amount and types of information made available by your internet browser and how search and download histories can be referenced to obtain a profile of your behaviors. Learn how use of various Google services and social media such as Facebook and LinkedIn may provide private information to unintended audiences.
- Telecomm Risks – Gain familiarity with cyber threats relevant to telecommunications, including eavesdropping, traffic analysis, geo-location and tracking, and cell phone forensics. Learn how cell phone and smart phone digital litter such as apps, emails, contacts, call logs, photos, texts, calendars, navigation, gaming, browsing activity, and backups can be easily exploited to obtain sensitive user data.
- System Compromise – Understand the threats, symptoms, and aftermath of a system compromise from theft, unauthorized physical access, and malware infection. Gain insight into the techniques used by malicious cyber threats, including imaging, social engineering, phishing, trojans, “dirty” Wi-Fi, spyware, bots, and password theft.
Real-world examples of each threat category will be reviewed in the classroom, and specific user strategies for mitigation will be provided - including available tools, recommended practices, and remediation options.
Executive Cyber Threat Awareness Briefing
Course Name: Executive Cyber Threat Awareness Briefing
Course Length: 2 hours (tailored to customer need)
This briefing is designed for the business executive traveling and working in international locations. Course material focuses on the risks associated with the use of computers and other telecommunications devices in various threat environments.
When away from the confines and relative security of the enterprise, executives are often a prime target for cyber espionage. Cyber criminals seeking to obtain confidential information related to business plans, products, industry secrets, financial records, or other sensitive personal data recognize that executives’ electronic assets and online behaviors often provide a valuable source of information.
The Executive Cyber Threat Awareness Briefing offered by ASI provides attendees with valuable insight into the specific threats targeting executives using electronic devices in remote settings. Several key attack vectors are reviewed, including:
- Digital Litter – Understand how your data files, programs, emails, contacts, calendars, photos, search histories, and other common digital trails, even those that are hidden or “deleted”, can be easily exploited to betray your identity and personal behaviors to external parties.
- Online Presence – Recognize the amount of potentially-sensitive information that may be exposed to unintended audiences by your activities on the internet and social media sites.
- Telecomm Risks – Gain familiarity with cyber threats associated with the use of cell phones and smart phones, including eavesdropping, geo-location and tracking, and cell phone forensics.
- Data Theft and Infection – Identify the symptoms and impacts of unauthorized access and malware infection. Gain insight into the techniques used by malicious cyber threats, including social engineering, phishing, spyware, and password theft. Learn what simple steps you can take to protect your sensitive business and personal information from prying eyes.
Upon completion, attendees will be knowledgeable in practical and effective steps to minimize the risk of exposure and significantly reduce the likelihood of an unfortunate crippling event.