Cyber Training For First Responders To Crime SceneCyber Training For First Responders To Crime Scene
FBI ties up with police association and Carnegie Mellon University to improve working knowledge of cyber investigations.
October 21, 2016
The FBI’s cyber unit, in association with experts from Carnegie Mellon University and the International Association of Chiefs of Police (IACP), has developed a Cyber Investigator Certification Program (CICP) to provide a working knowledge of cyber investigations to the first responders to a crime scene.
A release on the Bureau’s website says the first responder’s course was launched in October 2015 and is aimed at improving cyber knowledge of law enforcement personnel. So far 5,000 officers have enrolled for the training, which is free of charge.
“The more first responders understand about technology, the less chance there is of errors being made while securing a crime scene involving digital evidence,” says Special Agent James McDonald of the cyber division’s Cyber Training and Logistics unit.
There are nine online modules on topics like software, hardware, encryption, etc., with instructions from cyber experts. A certificate is awarded on course completion.
Also in the pipeline are four Level 1 classes for beginning-to-intermediate level detectives and three Level 2 courses for intermediate-to-advanced level officers.
For more details, click here.
About the Author(s)
Tricks to Boost Your Threat Hunting GameNov 06, 2023
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks