Educators

Webinar - The NCMEC Safeguard Program: A Model for Developing Your Resiliency Program

This webinar will discuss the steps necessary to support a healthy staff environment from the initial employment interview process, through training, employment, end of employment, and post-employment follow-up. A combination of research and case examples support the presentation.

  • Technical Level: Basic.
  • The following are encouraged to attend: detectives, forensic interviewers, sexual assault nurse examiners, victim advocates, juvenile court personnel, prosecutors, and other child-serving professionals.

Attend this webinar to:

Webinar: Reducing Recidivism: Improving Supervision Outcomes for FASD Probationers

Research suggests that as many as 60 percent of adolescents and adults with Fetal Alcohol Syndrome Disorder (FASD) come into contact with the criminal justice system. FASD is a prenatal brain injury that can make understanding and complying with probation conditions difficult, putting this population at higher risk for recidivism. Learn effective supervision strategies to improve supervision outcomes, prevent crime, and reduce recidivism. During the webinar, participants will:

"How To Hunt" Criminals and Terrorists: The Actionable Intelligence Workshop (June 2017)

This 1-day workshop is designed to instruct police department commanders, their police officers assigned to both patrol and investigative functions, and their analysts on how to aggressively collect and use actionable intelligence. The same intelligence techniques can also be used against both criminal and terrorist targets. The intelligence training taught in this workshop is designed to supplement the existing operational professionalism, skills, and experience within the audience.

"How To Hunt" Criminals and Terrorist: The Actionable Intelligence Workshop

This 1-day workshop is designed to instruct police department commanders, their police officers assigned to both patrol and investigative functions, and their analysts on how to aggressively collect and use actionable intelligence. The same intelligence techniques can also be used against both criminal and terrorist targets. The intelligence training taught in this workshop is designed to supplement the existing operational professionalism, skills, and experience within the audience.

Cybercrime: From Crime to Courtroom (Oct 2017)

The objective of this 2-day course is to focus on how Internet/cyber/computer technology-based criminal cases - as well as criminal cases reliant upon digital evidence - unfold in a courtroom and why it is vital for investigators, prosecutors, and computer forensic technicians to comprehend these elements throughout the entirety of their investigations and prosecutions. The format is interactive.
Key Learning Points:
* Comprehend the ever-changing online environments where crimes occur and the locations of evidential repositories.

Cybercrime: From Crime to Courtroom (Sep 2017)

The objective of this 2-day course is to focus on how Internet/cyber/computer technology-based criminal cases - as well as criminal cases reliant upon digital evidence - unfold in a courtroom and why it is vital for investigators, prosecutors, and computer forensic technicians to comprehend these elements throughout the entirety of their investigations and prosecutions. The format is interactive.
Key Learning Points:
* Comprehend the ever-changing online environments where crimes occur and the locations of evidential repositories.

Cybercrime: From Crime to Courtroom (Aug 2017)

The objective of this 2-day course is to focus on how Internet/cyber/computer technology-based criminal cases - as well as criminal cases reliant upon digital evidence - unfold in a courtroom and why it is vital for investigators, prosecutors, and computer forensic technicians to comprehend these elements throughout the entirety of their investigations and prosecutions. The format is interactive.
Key Learning Points:
* Comprehend the ever-changing online environments where crimes occur and the locations of evidential repositories.

Pages