Today is: 

Custom Training Programs

Always tailored to client needs and can be conducted in our new 3,000 sq. ft. Training and Collaboration Center or client's location.

Training Courses
  • CYBER-TELECOMMUNICATIONS THREAT COURSE (CTTC)

  • COMMERCIAL OPERATIONS PLANNING COURSE (COPC)

  • INTRO TO WINDOWS FORENSIC ANALYSIS (IWFA)

  • FORENSIC TIMELINE ANALYSIS (FTA)

  • FORENSIC REGISTRY ANALYSIS (FRA)

Mission Enhancing Seminars
& Support Services
  • ADVANCED BUSINESS ELICITATION (ABE)

  • BUSINESS RISK MANAGEMENT/VALIDATION (BRMV)

  • SOCIAL MEDIA'S IMPACT ON BUSINESS
    & YOU

  • DIGITAL IMMUNIZATION AND DETECTION (DID)

  • DIGITAL LITTER ANALYSIS (DLA)

  • OTHER

Training Program Descriptions

Full Mission Profile Exercise Development & Support

From basic assessment of perishable skills to full blown validation exercises to assess students readiness, AFC's professionals can develop realistic training scenarios focused to enhance individual, support team and detachment core and supporting tasks.

Training Courses

CYBER-TELECOMMUNICATIONS THREAT COURSE (CTTC)

Course Length: 5 days / 40 hours
Course Overview:
This instructor-led course is designed for personnel traveling and working in overseas locations. The course focuses on the threats associated with the use of computer and telecommunications related devices in various types of operational environments. The training provides familiarization with digital forensics and exploitation tools, as well as social media and engineering techniques that are used to target individuals and to gain access to sensitive information on electronic devices. Methods that can be used to minimize exposure and reduce the risk of digital attack are discussed and demonstrated in the classroom. This is an extensive hands on and practical application course.

COMMERCIAL OPERATIONS PLANNING COURSE (COPC)

Course Length: 5 Days / 40 hours - or - 10 Days / 80 hours
Course Overview:
This instructor-led course is designed for personnel traveling and working commercially overseas. The course focuses on the full spectrum of skills required to properly plan in order to operate commercially in a semi-permissive and hostile counter-intelligence environments. This is an extensive hands on and practical application course. Training and scenarios will be tailored to students/clients requirements.

INTRO TO WINDOWS FORENSIC ANALYSIS (IWFA)

Course Length: 2 days / 16 hours
Course Overview:
This course provides attendees with an understanding of the Windows operating system from a forensic analyst’s perspective, by reviewing the internal data structures and interdependencies between a variety of artifacts of system and user activity on Windows systems. Discussion focuses on examinations that are predicated by the “Trojan Defense” (i.e., claims of malware being responsible for observed activity), attempts to locate previously undetected malware, attempts to mask or hide user activities from forensic analysis, as well as any other instances of user activity being brought into question.

FORENSIC TIMELINE ANALYSIS (FTA)

Course Length: 2 days / 16 hours
Course Overview:
This hands-on course, led by an instructor who is one of the primary developers and promoters of the timeline analysis technique within the Digital Forensics & Incident Response (DFIR) community, provides a solid foundation in the purpose and practice of conducting a comprehensive timeline analysis of system activity, allowing an analyst to quickly add context to valuable data. Instruction covers the various sources and formats of time stamped data available on Windows systems and the events that can affect those times. Also reviewed are the techniques and free/open source tools available for extracting and compiling this information into a timeline.

FORENSIC REGISTRY ANALYSIS (FRA)

Course Length: 1 day / 8 hours
Course Overview:
This hands-on course is led by a recognized leader in the digital forensics field in Registry analysis, and author of Windows Registry Forensics. Instruction provides a thorough understanding of the Windows Registry, from a binary and an analytic perspective. Discussion focuses on the binary structure of the Registry, how operating systems make use of the Registry, as well as free and open source tools for monitoring, examining and extracting pertinent data from the Registry (including deleted keys and values).

Mission Enhancing Seminars & Support Services

ADVANCED BUSINESS ELICITATION (ABE)

Seminar Length: 1-3 days (Pending Client’s Requirements)
Seminar Overview:
Applied Fundamentals Consulting (AFC) provides students an opportunity to meet desired industry C-Level Executives and staff in order to develop and /or enhance current skill level tasks. AFC will establish a suitable environment (ranging from one on one instruction/mentoring to full blown social networking events) appropriate for the client’s experience level and needs.

BUSINESS RISK MANAGEMENT/VALIDATION (BRMV)

Seminar Length: 1-3 days (Pending Client’s Requirements)
Seminar Overview:
BRMV is designed to identify how social media can be used to target individuals and commercial entities and develop mitigating strategies to protect against the threats. Instruction includes demonstrations and practical applications using several forms of social media e.g. facebook, twitter, linked-in, and google +. In addition, student’s will be shown how the same threats of social media can be used to conduct due diligence and business validation themselves.

DIGITAL IMMUNIZATION AND DETECTION (DID)

Length: TBD (Responsive to Client’s Requirements)
Support Overview:
Digital Immunization and Detection provides pre-travel digital forensic immunization, and then post-travel virtual and physical alteration detection for client data systems and physical components, focusing on mitigating security risks and identifying infections when pre-travel mitigation steps were not possible. Expert analysts obtain physical and virtual images of all client devices pre-travel, and then identify/isolate potential malware infections post-travel. This service is tailored to each client’s specific geographic exposure and regionally-specific hostile security risks.

DIGITAL LITTER ANALYSIS (DLA)

Length: Dependent on Client’s Requirement
Support Overview:
Digital Litter Analysis deconstructs a device’s digital contents from an offensive forensics perspective. Using digital forensics techniques, AFC writes the story of the device’s user by analyzing the artifacts on the drive. At the end of the analysis, the device’s user reads the created story to see whether the digital litter supports their security and operational needs - ensuring client knows what story their device tells.

Contract Vehicles

Applied Fundamentals' contract schedules allow all U.S. Government entities to utilize the broad range of services that we have to offer.

Specialized Services

Applied Fundamentals provides specialized,
multi-disciplined services to meet our clients' most challenging business requirements.

Contact Us

Phone: 703-230-8102
Email: contact@appliedfundamentals.net

13655 Dulles Technology Drive, Suite 160 Herndon, VA 20171