Juvenile Justice Agencies

CI102 Basic Cyber Investigations: Dark Web & Open Source Intelligence (Virtual, June 2020)

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites. 

FC102 Financial Investigations Triage (Virtual, June 2020)

This course provides an overview of the actions investigators can take at the outset of a financial crime investigation. Students learn to ask critical questions, gather documentation, and analyze information for leads. Topics include obtaining and working with financial records, red flags in financial cases, money laundering, investigative strategies for different types of financial crimes, and commingled funds.

Autopsy: Open Source Digital Forensics Basics Part 1

Autopsy is a free and open source digital forensics platform with many features comparable to those found in the leading commercial tools. It can be installed on Windows, macOS, and Linux operating systems. In part 1 in a two-part series, this webinar will start by walking through setting up a new case and exploring effective tool usage. Attendees will then learn digital forensics best practices and methods for quickly locating items of evidentiary value.

Understanding Facebook Search Warrant Returns

Data of evidentiary value in criminal cases is generated both on the suspect device and the services it utilizes. While recovery of data from the suspect device is regularly performed, user account data stored off-device from these services often remains overlooked. This overlooked data is increasingly becoming crucial evidence in cases. In this webinar, we will manually review a Facebook search warrant return examining the different artifacts that can be provided within a return. Once manual examination is complete, a review of the same return with an automated tool will be conducted so the two methods of examination can be compared.

Encryption, Encoding, Inaccessible Data and Devices

Hash, encryption, full disk, file based, and the list goes on! Words used correctly and incorrectly when examiners discuss or even report on evidence. This webinar is intended to lay the framework for a factual understanding of how encryption and hashing are used in our digital investigations. Real world applications of hashing, and encryption will be shown, with an emphasis on how they impact investigations in 2020. Questions such as: "Does the application encrypt data?", "How is it encrypted?", and "Why can't I decrypt it?" will be discussed.

FC099 Basic Level Spreadsheeting Skills

This one-day course provides foundational spreadsheeting knowledge and skills to enhance workplace productivity. The course covers basic navigation of Microsoft Excel by combining live demonstrations and hands-on exercises. Users will learn how to:

  • Work with multiple worksheets within a workbook.
  • Hide, unhide, and protect worksheets.
  • Adjust rows and columns.
  • Use copy and paste options. 
  • Find, select, and sort data.

CI240 Intermediate Cyber Investigations: Virtual Currency (May 7-8, 2020, Virtual)

This course provides students with the fundamental knowledge and skills they need to investigate crimes involving virtual currency. Instructors explain foundational concepts like the characteristics of money, virtual currency, and cryptocurrency. Blockchain technology, proof work, and proof of stake are covered, and students learn how industry-leading cryptocurrencies (Bitcoin, Ethereum, and Monero) work and how they differ from each other. Finally, students learn investigative techniques for tracking and documenting transactions and best practices for seizing and securing cryptocurrency.

DF100 Basic Digital Forensic Analysis: Seizure (May 14, 2020, Virtual)

This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve digital evidence at a crime scene. Topics include recognizing potential sources of digital evidence; planning and executing a digital evidence-based seizure; and the preservation, packaging, documentation, and transfer of digital evidence.

DF205 Intermediate Digital Forensic Analysis - SQLite Primer (May 29, 2020, Virtual)

Mobile devices dominate the intake list and the desks of most digital forensics analysts globally. With an increase in device security, the need for detailed analysis is also increasing. SQLite is a self-contained, serverless database engine. It is found on nearly every operating system and dominates iOS, Android, and macOS as one of the most prevalent and relevant data storage mechanisms. Rather than hope our forensic tools support the newest applications or be tethered to how a certain utility parses data, analysts can arm themselves with the skills and techniques needed to conquer the analysis of nearly any application.

    FC102 Financial Investigations Triage (May 5, 2020, Virtual)

    This course provides an overview of the actions investigators can take at the outset of a financial crime investigation. Students learn to ask critical questions, gather documentation, and analyze information for leads. Topics include obtaining and working with financial records, red flags in financial cases, money laundering, investigative strategies for different types of financial crimes, and commingled funds.

    Pages