Providing expert training in cybersecurity, digital forensics, risk management, technology, and leadership.

Stay Connected!

Affordable Trusted Training by Experienced Instructors

Years of Experience
Hours of Training Delivered
Digital Forensic Examinations
Cyber Investigations Conducted

Natsar is dedicated to making high quality and relevant training available at an affordable cost. We want to decrease the skills shortage in cybersecurity and ensure our cyber defenders are well trained, which benefits us all. Natsar recognizes that most cybersecurity training costs thousands of dollars, creating hardships for individuals and organizations. We think there is a better way and quality training can be offered at a reasonable cost.

Cybersecurity Programs

Learn how to build a cybersecurity program from the beginning, or mature an existing one.

Incident Response

Learn how to respond to cyberattacks, about the IR lifecycle, incident handling procedures, and building IR plans

Digital Forensics

Learn how to conduct digital forensic examinations on various devices and manage DFIR programs

Cybersecurity Assessments

Learn how to conduct assessments and how to prepare for upcoming audits

Implementing Best Practices

Learn different frameworks like CIS and NIST and how to implement them

Risk Management

Learn how to conduct risk assessments, identify and prioritize risks, and update your risk register

Vulnerability Management

Learn how to reduce vulnerabilities and manage risk in an environment

Strategy and Roadmaps

Learn how to develop strategic plans and roadmaps for security and technology programs and products


 available documentation

If you are looking for policies, procedures, forms, templates, and other editable documents for your organization or business, we have you covered. With new documents added to our library frequently, Natsar has a number of items available. Our documents are completely editable and built based on best practices. Many of our policies and documents are in use across the world in federal governments, state and local governments, and corporations to comply with laws, regulations, standards, and frameworks. In fact, our documents have been downloaded over 70,000 times and have helped organizations achieve accreditation and compliance requirements for standards such as the NIST Cybersecurity Framework, NIST Risk Management Framework, CIS Critical Security Controls, ISO 17025, ASCLD/LAB, and others.


Below are some of the documents available, however we also offer bundles and some of our online courses come with documents as well. For our entire offering in this area, visit our products page.



Case Disposition Status Request Form Case Disposition Status Request Form
Post Mortem Analysis Checklist – Windows Post Mortem Analysis Checklist – Windows
Internal Chain of Custody Form Internal Chain of Custody Form
Consent to Search Form Consent to Search Form
CV Template CV Template
Workstation Image Update Workstation Image Update
Item added to cart View Cart Checkout
What Our Clients Say...
U.S. Army
Information Technology Specialist

Whoa!! What an eye-opener and game changer! Looking forward to implementing this; so simple, yet so impactful!

U.S. Army
Knowledge Management Lead

You are always prepared and professional; you’re engaging and relatable.

U.S. Air Force
GS-15 Program Manager

I’ve heard from several members of my team who found the course beneficial and learned several techniques to improve their communication with Senior Leaders. I believe the goal of the course was achieved, many personnel who are relatively new to communicating with Senior Leaders have learned to tailor their delivery for improved results.

U.S. Air Force
GS-15 Director of Cyberspace Operations

You presented an excellent brief, well spoken and easily understandable slides. Gave us a solid way forward.

U.S. Air Force
Program Manager

Your briefing was presented in a well thought out and aligned method tailored to the audience.

U.S. Army
Cybersecurity Specialist

Course was just right in length relative to content delivered. Very helpful workshop.

Children's Advocacy Center
Executive Director

I strategically put you on after lunch when people usually want to take a nap, because I know that you will keep the students riveted to their seats for one hour. You know your stuff and present it with clarity and passion. You are the highlight of the training for all who attend according to our evaluations. Most say they wish you could have spoken for two hours!

National District Attorneys Association
Senior Attorney

Every time you have presented it has been fantastic. The only complaint that has ever been registered against you in any of the seminars was that you were not given enough time.

National District Attorneys Association

You need to be given more time to speak on topics, because you have been the best speaker on the most relevant topics all week.

National District Attorneys Association

Awesome! Awesome again! Excellent presenter.

National District Attorneys Association
Senior Attorney

Thank you for presenting at the Unsafe Havens I conference in Chicago, Illinois. Your presentations on Technical and Legal Defenses, P2P Investigations, Emerging Issues with Forensic Evidence, Cell Phone Forensics, Tracking Wireless Technology, and Direct Examination of a Computer Forensic Expert were instrumental in making Unsafe Havens I a big success.

National District Attorneys Association
Senior Attorney

We would like to thank you for your dedication and commitment to the training of our prosecutors at Unsafe Havens I in Santa Fe, New Mexico. Feedback from prosecutor participants at this conference was uniformly positive. Several indicated that this was one of the best training courses that they ever attended.

Oregon Department of Justice
Chief Investigator

I would like to take this opportunity to thank you for a very professional presentation at the Internet Crimes Against Children (ICAC) quarterly sharing meeting. ICAC member affiliates appreciated the time to share the how-to of setting up and operating a regional lab.

City Government
Deputy Chief of Police

We had a presentation for our city council and executive staff. Your instructor was poised, professional, and extremely competent. He presented in a manner that even those that are obviously less experienced in the world of computers and information technology can easily follow along. The presentation was powerful, informative, and in regards to the crimes against children in our community – shocking. He is quite obviously well educated, articulate, experienced, and has a passion for what he is doing.

National District Attorneys Association

This was one of the best courses I’ve attended. I feel comfortable with the motions and trial but wanted to know more about the forensics, forensic trial testimony and combating legal defenses. This course was very helpful to me.

Navy Federal Credit Union
Assistant Vice President

Again, really great stuff, and I only wish I’d come across this sooner. As it happens, I’m preparing my DF team for an audit of our DF lab – which includes lab management procedures. In searching for ways to structure lab management, I came across your course. Glad I did. Thanks!

Navy Federal Credit Union
Assistant Vice President

The Natsar “Creating a Digital Forensic Capability” course is exactly what I’d been looking for to help move our forensics program ahead. Excellent work and excellent content. Thanks!



Our instructors have taught across the world. Audiences have included organizations such as the U.S. Army, U.S. Air Force, U.S. Navy, Office of the Director of National Intelligence (ODNI), Department of Energy, Department of Defense, FDIC, Federal Reserve Bank, Gartner, Center for Internet Security (CIS), and numerous private corporations, businesses, and non-profits.


Natsar brings 20 years of full-time, practical experience to our courses plus formal education and numerous certifications. Our instructors have worked with organizations including the Federal Bureau of Investigation, the Department of Energy, the National Nuclear Security Administration, Gartner, CIS and held positions including cybercrime task force commander, police lieutenant, chief information officer, chief information security officer, executive partner, senior vice president, and principal.


CEH Logo
Contact Natsar

Privacy Preferences
When you visit our website, it may store information through your browser from specific services, usually in form of cookies. Here you can change your privacy preferences. Please note that blocking some types of cookies may impact your experience on our website and the services we offer.