Law Enforcement

Cyber Investigation 152 - Search Warrants & Digital Evidence Web-based (Nov 2017)

This course provides information on obtaining and executing search warrants in cases involving digital evidence, with a focus on the similarities and differences between these and other search warrants. The course covers:

Cyber Investigation 152 - Search Warrants & Digital Evidence Web-based (Oct 2017)

This course provides information on obtaining and executing search warrants in cases involving digital evidence, with a focus on the similarities and differences between these and other search warrants. The course covers:

APA Webinar - Strategies for Prosecuting Drug-Induced Homicide Cases

Join the Association of Prosecuting Attorneys for the webinar “Strategies for Prosecuting Drug-Induced Homicide Cases” on November 15. Opioid overdose deaths are increasing across the country. Some jurisdictions are charging dealers under drug-induced homicide statutes. Learn about the challenges, successes, and strategies - from investigations to sentencing - from veteran investigators and prosecutors in both strict liability and proximate cause jurisdictions.

On November 1, 2017, a Federal Interagency Working Group coordinated by the White House National Security Council released the new as a resource for local jurisdictions. When conducting routine activities, law enforcement, fire, rescue, and emergency medical services personnel are increasingly likely to encounter fentanyl, a synthetic opioid that can be present in a variety of forms and is more powerful than heroin.

Cybersecurity 235 - Basic Network Intrusion Investigations BNII (Sep 2017)

The "Cybersecurity (CS) 235 - Basic Network Intrustion Investigations" (BNII) course covers the skills and techniques involved in responding to a network security incident. The course focuses on the identification, extraction, and detailed examination of artifacts associated with network and intrusions. Memory analysis, host machine forensics, network traffic and log analysis, malware analysis, and virtual machine sandboxing are covered through lecture, discussion, and hands-on exercises.

Cybercop 250 Linux Open Source Forensics

The "Cybercop (CC) 250 Linux Open Source Forensics" course teaches students how to use free and open source software to conduct digital forensic examinations. Students learn to locate and install free Linux-based forensic software. After covering key forensic concepts as applied to open source software, basic forensic analysis techniques are covered.

Cybersecurity 235 - Basic Network Intrusion Investigations BNII (Feb - Mar 2018)

The "Cybersecurity (CS) 235 - Basic Network Intrusion Investigations" (BNII) course covers the skills and techniques involved in responding to a network security incident. The course focuses on the identification, extraction, and detailed examination of artifacts associated with network and intrusions. Memory analysis, host machine forensics, network traffic and log analysis, malware analysis, and virtual machine sandboxing are covered through lecture, discussion, and hands-on exercises.

Cybersecurity 235 - Basic Network Intrusion Investigations BNII (Feb 2018)

The "Cybersecurity (CS) 235 - Basic Network Intrustion Investigations" (BNII) course covers the skills and techniques involved in responding to a network security incident. The course focuses on the identification, extraction, and detailed examination of artifacts associated with network and intrusions. Memory analysis, host machine forensics, network traffic and log analysis, malware analysis, and virtual machine sandboxing are covered through lecture, discussion, and hands-on exercises.

Pages