Judges

DF310 Advanced Digital Forensic Analysis: Windows

This course covers the identification and extraction of artifacts associated with the Microsoft Windows operating system. Topics include the Change Journal, BitLocker, and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs, Volume Shadow Copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

PT200 Digital Evidence Foundations for Prosecutors

This 2-day course provides the practical legal and technical information prosecutors need to successfully identify, obtain, and use digital evidence in their cases. Legal topics include digital evidence identification, lawful seizure, extraction, discovery, and admission in court. Technical topics include examining the many types of digital evidence commonly encountered during investigations. This evidence is often found during searches of persons, residences, computers, mobile devices, phones, cell towers, and vehicles, together with the vast amounts of data held in cloud storage or by third-party service providers. The course will discuss how to legally obtain and use this evidence to comply with the ever-changing case law and ethical considerations. Unique issues related to investigating and prosecuting cases will also be highlighted.

Cyber Threats to Land Mobile Radio

The Public Safety Threat Alliance Intelligence team will present our observations and assessments on the trends and developments of cyber activity targeting land mobile radio operations in public safety globally.

Presented by:
Tyler Brodbeck, Threat Intelligence Manager, Motorola Solutions
Travis Randall, Senior Threat Intelligence Analyst, Motorola Solutions

Emerging Technology Overview

Participants will learn about the strategic implications of emerging technologies and the rapid pace of technological advancement. This webinar will examine how these technologies can create new avenues for public safety, while also fostering impediments. Some of the topics under examination in the presentation include digital identity, advanced analytics, artificial intelligence, communication networks, internet of everything, and biometric technology and collection. Dr. Matt Lehman will present on his research and observations gathered from a career that has included work as a local law enforcement officer and a supervisory intelligence analyst with the FBI.

Presenter,
Dr. Matt Lehman, Supervisory Intelligence Analyst, FBI Office of Partner Engagement

Don't Gamble with Counterfeit Auto Parts

Some of the most dangerous counterfeits involve explosive elements of automotive airbags, which can literally explode in the victim's face during a low impact car accident. Join the Automotive Anti-Counterfeiting Council (A2C2) and learn how the members of the association can assist law enforcement with intellectual property investigations. Law enforcement has identified a trend of counterfeited automotive parts growing at an alarming rate. The Automotive Anti-Counterfeiting Council members include: Ford, GM, Honda, Hyundai, Kia, Mercedes-Benz, Nissan, Stellantis, Subaru, Toyota, and VW Group of America.

Presented by,
Thomas H. Kipelius, Brand Protection Investigator, Stellantis

IA102 Introduction to Link Analysis

This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations. Introduction to Link Analysis (ILA) expands on the basic principles of link and association analyses explored in the Foundations of Intelligence Analysis Training (FIAT) while building a framework for more advanced methods such as social network analysis.

Expanding basic knowledge of link and association analysis
Explaining the process of social network analysis
Understanding the visual mapping and mathematical components associated with link and social network analyses

DF205 Intermediate Digital Forensic Analysis: SQLite Primer

Mobile devices dominate the intake list, and the desks of most digital forensics analyst globally. Devices are becoming more secure, with an increase in security the need for detailed analysis is increasing as well. SQLite is a self-contained, serverless database engine. It is found on nearly every operating system and dominates iOS, Android, and macOS as one of the most prevalent and relevant data storage mechanisms. Rather than hope our forensic tools support the newest applications or be tethered to how a certain utility parses data we can arm ourselves with the skills and techniques needed to conquer the analysis of nearly any application.

What is SQLite and how to identify and analyze logically
Recognizing relevant locations of valuable data within SQLite database.
Develop skills needed for crafting custom SQLite queries.
Learn how to recognize and decode a variety of common timestamp formats.
Learn how to perform SQLite analysis with automation.

DF205 Intermediate Digital Forensic Analysis: SQLite Primer

Mobile devices dominate the intake list, and the desks of most digital forensics analyst globally. Devices are becoming more secure, with an increase in security the need for detailed analysis is increasing as well. SQLite is a self-contained, serverless database engine. It is found on nearly every operating system and dominates iOS, Android, and macOS as one of the most prevalent and relevant data storage mechanisms. Rather than hope our forensic tools support the newest applications or be tethered to how a certain utility parses data we can arm ourselves with the skills and techniques needed to conquer the analysis of nearly any application.

What is SQLite and how to identify and analyze logically
Recognizing relevant locations of valuable data within SQLite database.
Develop skills needed for crafting custom SQLite queries.
Learn how to recognize and decode a variety of common timestamp formats.
Learn how to perform SQLite analysis with automation.

IA102 Introduction to Link Analysis

This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations. Introduction to Link Analysis (ILA) expands on the basic principles of link and association analyses explored in the Foundations of Intelligence Analysis Training (FIAT) while building a framework for more advanced methods such as social network analysis.

Expanding basic knowledge of link and association analysis
Explaining the process of social network analysis
Understanding the visual mapping and mathematical components associated with link and social network analyses

FC200 Intermediate Level Spreadsheeting Skills: Assessing and Organizing Data

This intermediate spreadsheeting course uses Microsoft Excel to assess and organize data in an electronic format. The class is designed for learners who have experience using Excel and who want to increase their spreadsheeting knowledge and skills. Topics include text functions, absolute referencing, date and time functions, flash fill, handling formula errors, VLOOKUP, dynamic arrays, and data validation. The course combines live demonstrations, instructor-led exercises, and independent student exercises.

Pages