International Media Forensics Collection Survey
The data being collected is to be used as a research product in the Utica College Cyber Security Masters program and in the Keiser University DBA program. All data will be made available for post hoc analysis in the...
Read moreTraining Simulations Development
HTCI has been building and developing training simulations for our clients for over 10 years. We have been asked in the past to provide portal sites that replicate real world portals. This allows a student to be able to...
Read moreCELLEX/MEDEX/DOCEX
We are the experts Our cadre are all current or recently former professionals that are or have been working in these fields for years. HTCI is proud to present the hands on training that will allow a student to...
Read moreSensitive Site Exploitation
Sensitive Site Exploitation or SSE is a new buzzword for a very old process (Law Enforcement Forensics). In todays complex theaters of operations around the world the need to be able to gather data from all usable sources has become critical.
Read moreTechnology Training Development Planning (Correlation Seeding and Testing)
The creation of realistic scenario based training today is extremely difficult. There are many complexities that go into the creation of training media that many people just dont understand. In the past training devices have been created by someone simply...
Read moreCellphone Testing Tools (Seeded Devices)
Validation of ones tools has been very important in today’s very complex world of Cellphone acquisition. Courts are requiring tool validation before allowing evidence into their courtrooms. Military operations require validation that the tools being used work before operators...
Read more