Official websites use .gov
Secure .gov websites use HTTPS

To meet the continuously evolving cybersecurity threats facing the United States, the Defense Department established what is now known as the DOD Cyber Crime Center's Cyber Training Academy in 1998 near Linthicum Heights, Maryland.

Today, DC3 functions as a designated federal cyber center and a DOD Center of Excellence for digital and multimedia forensics. DC3 operates under the secretary of the Air Force executive agency.

Students pose for group photo.
Cyber Students

International students from the Defense Department Cyber Crime Center’s Cyber Training Academy.
Photo By: DOD

VIRIN: 221002-O-D0439-002Z

#cboxClose { position: absolute; top: 5px; right: 5px; display: block; background: url(/desktopmodules/articlecs/images/media_popup_close.png) no-repeat top center; width: 40px; height: 40px; text-indent: -9999px; } #cboxClose:hover { background-position: bottom center; } .me-plugin { width: 100%; height: 100%; }

var gih = 0;
var giw = 0;
var pup;
var g_isDynamic = false;

function popupResize(ibox, w, h, doResize) {
if ($(ibox).hasClass(‘dgov2popup-info’)) {
// This block is included once, so is shared by all media tokens.
// this block is how we execute the special resize for dgov2’s slideshow popup
dgov2slideshowPopupResize(ibox, w, h, doResize);

if (!g_isDynamic)

var isMobile = window.matchMedia(‘(max-width: 1200px)’).matches;

if (isMobile) {
$.colorbox.resize({ width: “100%”, height: “100%” });

$(ibox).find(“.info”).css(‘height’, ‘auto’);

var iw = w;
var ih = h;
var ww = $(window).width();
var wh = $(window).height();
var hextra = 40;
var wextra = 360;
var hborder = 120;
var wborder = 120;
var maxw = ww – wextra – wborder;
var maxh = wh – hextra – hborder;
var ratio = Math.min(maxw / iw, maxh / ih);

iw = Math.floor(iw * ratio); // use floor to avoid overflow scrollbar
ih = Math.floor(ih * ratio);

// console.log(iw + ” ” + ih + ” — ” + (iw + wextra) + ” ” + (ih + hextra))



if (doResize)
$.colorbox.resize({ width: iw + wextra, height: ih + hextra });

$(window).resize(function () {
if (g_isDynamic && pup !== undefined)
popupResize(pup, giw, gih, true);

$(window).load(function () {
$(“.popup”).click(function () {
giw = $(this).data(‘width’);
gih = $(this).data(‘height’);
pup = $($(this).attr(‘href’));
g_isDynamic = $(this).data(‘dynamic’) === 1 ? true : false;

popupResize(pup, giw, gih, false);

var w = “768px”;
var isMobile = $(window).width() < 768 ? true : false;
w = "auto";
if (isMobile)
w = "100%";

const isDgov2Slideshow = $(this).attr("data-isdgov2slideshow") != undefined;
const slideNumber = parseInt($(this).attr('data-slide-number'));
const slideIndex = slideNumber – 1;
//console.log("slideNumber for popup", slideNumber)
const popupThis = this;
className: 'inline-popup', fixed: true, transition: "none", opacity: .9, inline: true, width: w, height: 'auto', maxWidth:"80%", maxHeight:"100%", close: "X", onClosed: function () {
onComplete: function () {
var popupHeight = jQuery(this.href.substring(this.href.lastIndexOf("#"))).outerHeight(true);
if (jQuery("#colorbox").height() < popupHeight) {
if (g_isDynamic) {
if (!isMobile) {

// for popup having data-isdgov2slideshow attr (see above)
if (isDgov2Slideshow) {
const popSelector = '#dgov2popup-target-3189118';
const ssSelector = '#dgov2slideshowId-3189118';
numSlides: 0,
startingSlideIndex: slideIndex,
popupSelector: popSelector,
slideshowSelector: ssSelector,
slideshowMediaId: 3189118,
giw = $(popupThis).data('width');
gih = $(popupThis).data('height');
pup = $($(popupThis).attr('href'));
popupResize(pup, giw, gih, true);
onClosed: function () {
pup = undefined;
if (g_isDynamic)

if (isDgov2Slideshow) {
const popSelector = '#dgov2popup-target-3189118';
const ssSelector = '#dgov2slideshowId-3189118';
popupSelector: popSelector,
slideshowSelector: ssSelector,


inline: true,
onComplete: function () {
// stop scrollbar from flashing
$("#cboxLoadedContent").css("overflow", "");
$("#cboxLoadedContent").css("overflow-y", "hidden");
onClosed: function () {
$('.slideshow-gallery').trigger('slideTo', 0);


"The academy provides valuable training, accessible virtually anywhere and at any time," said Casey Szyper, director of DC3 CTA. "A rigorous curriculum provides department personnel with the relevant knowledge and cutting-edge skills they need to meet mission goals."
CTA's mission is to provide cyber training to ensure defense information systems are secure from unauthorized use, counterintelligence and criminal and fraudulent activities, said Szyper.
Students can access training courses in four ways: in-residence; instructor-led virtual; online self-paced; or mobile training teams in locations throughout the U.S. and abroad.

Students pose for group photo.
Field Trip

Students from the Defense Department Cyber Crime Center’s Cyber Training Academy take a field trip to Washington, D.C.
Photo By: DOD

VIRIN: 221002-O-D0439-001R

The academy provides training in more than a dozen courses—ranging from computer basics to network intrusions and cyber analysis—designed to meet the evolving needs of students, said Szyper.
Also, the academy offers training in modern cybersecurity tools such as open vulnerability assessment scanner and network mapper.
In an effort to offer cyber training across the department, the academy offers a newly designed "CyberCast" which can train common access card/personal identity verification cyber operators through virtual self-paced and skillset-specific materials.

The academy offers three DOD certifications, widely recognized as validations of competency in digital forensic skills, to students who pass the following combinations of courses: digital media collector, digital forensic examiner and cyber-crime investigator with counterintelligence/law enforcement badge.
Another unique offering from CTA is their International Cyber Forensics Course.
"The ICFC provides students with the solid working knowledge necessary to conduct incident response and digital forensics of digital media to include networks." said Angela Jenkins, CTA ICFC Training Coordinator. "The course is in-residence for five weeks with 200-hours of instruction, and more than 94-hours of hands-on training."
The following encompasses the ICFC schedule:

​International Cyber Forensics Course Schedule
Week 1: Introduction to Networks and Computer Hardware
Week 2: Cyber Incident Response Course
Week 3: Windows Forensics Examination-En-Case
Weeks 4 and 5: Forensics and Intrusions in a Windows Environment

The latest ICFC, held Aug. 1 through Sept. 2, included students from Hungary, Kuwait, Korea, and Jordan. This was the largest student population in any one iteration since inception of the course in 2019. To date, and through COVID-19 pandemic international limitations, the academy has trained 22 international partners in six separate iterations of the ICFC.
Upon completion of the ICFC, students will master the following:

Course Objectives
Identify hardware components in a computer system
Employ operating system tools to manage disks, partitions and file systems
Perform domain management and administrative tasks using Windows server active directory and group policy tools
Configure a system to be able to communicate on a network
Perform basic computer troubleshooting
Perform basic computer tasks using Windows
Prepare for a cyber incident response and perform the role of a first responder
Prepare accurate documentation of a cyber investigation to include all actions taken
Examine where digital data resides in a variety of digital devices
Collect volatile and non-volatile data
Demonstrate how to handle digital media effectively upon responding to an incident
Generate hash values for collected data and forensic images
Conduct a forensic examination of an image of the Windows operating system
Demonstrate the basic functions, configurations, outputs, tools and settings of EnCase
Examine a forensic image from a Windows computer using basic forensic processes and automated tools in EnCase
Use password recovery toolkit to defeat protected files
Generate a detailed and accurate account of a network intrusion
Analyze network-based evidence
Analyze host-based evidence
Explain how to conduct a lawful network investigation

"DC3 has the unique privilege of interacting with our globally-positioned cyber partners in an educational forum," said Jude Sunderbruch, DC3 executive director. "Graduating students of our ICFC have helped to foster positive relationships between DC3 and their host U.S. embassy representatives, national security counterparts, and both U.S. and foreign military training delegates."

Currently, the academy is only approved to train ministry of defense personnel in partner nations. Collaboration and discussions between the International Military Student Office and Defense Security Cooperation Agency continue in an effort to increase support and funding for training non-MOD personnel through the Section 345 Regional Defense Fellowship Program.
Choose which products you want delivered to your inbox.
The Department of Defense provides the military forces needed to deter war and ensure our nation’s security.