Law Enforcement

CJI The Methamphetamine Challenge for Law Enforcement Executives ONLINE (June 2014)

COURSE DESCRIPTION: Law enforcement executives must make critical decisions to address the spread of methamphetamine in their communities. This online course provides an overview of the illicit methamphetamine problem from a management perspective. Methamphetamine lab hazards, manufacturing methods, OSHA regulations, equipment, training needs, and reporting issues are emphasized to assist law enforcement executives and local municipal officials to effectively combat methamphetamine production and abuse in their communities.

CJI The Methamphetamine Challenge for Law Enforcement Executives ONLINE (May 2014)

COURSE DESCRIPTION: Law enforcement executives must make critical decisions to address the spread of methamphetamine in their communities. This online course provides an overview of the illicit methamphetamine problem from a management perspective. Methamphetamine lab hazards, manufacturing methods, OSHA regulations, equipment, training needs, and reporting issues are emphasized to assist law enforcement executives and local municipal officials to effectively combat methamphetamine production and abuse in their communities.

CJI The Methamphetamine Challenge for Law Enforcement Executives ONLINE (Apr 2014)

COURSE DESCRIPTION: Law enforcement executives must make critical decisions to address the spread of methamphetamine in their communities. This online course provides an overview of the illicit methamphetamine problem from a management perspective. Methamphetamine lab hazards, manufacturing methods, OSHA regulations, equipment, training needs, and reporting issues are emphasized to assist law enforcement executives and local municipal officials to effectively combat methamphetamine production and abuse in their communities.

CJI The Methamphetamine Challenge for Law Enforcement Executives ONLINE (Mar 2014)

COURSE DESCRIPTION: Law enforcement executives must make critical decisions to address the spread of methamphetamine in their communities. This online course provides an overview of the illicit methamphetamine problem from a management perspective. Methamphetamine lab hazards, manufacturing methods, OSHA regulations, equipment, training needs, and reporting issues are emphasized to assist law enforcement executives and local municipal officials to effectively combat methamphetamine production and abuse in their communities.

CJI The Methamphetamine Challenge for Law Enforcement Executives ONLINE (Feb 2014)

COURSE DESCRIPTION: Law enforcement executives must make critical decisions to address the spread of methamphetamine in their communities. This online course provides an overview of the illicit methamphetamine problem from a management perspective. Methamphetamine lab hazards, manufacturing methods, OSHA regulations, equipment, training needs, and reporting issues are emphasized to assist law enforcement executives and local municipal officials to effectively combat methamphetamine production and abuse in their communities.

CJI The Methamphetamine Challenge for Law Enforcement Executives ONLINE (Jan 2014)

COURSE DESCRIPTION: Law enforcement executives must make critical decisions to address the spread of methamphetamine in their communities. This online course provides an overview of the illicit methamphetamine problem from a management perspective. Methamphetamine lab hazards, manufacturing methods, OSHA regulations, equipment, training needs, and reporting issues are emphasized to assist law enforcement executives and local municipal officials to effectively combat methamphetamine production and abuse in their communities.

ICAC-SIT Cell Phone Investigation, Collection, and Law Training (May 2013)

This three-day course provides crucial skills for investigators and first responders responsible for handling cellular and other mobile devices. The course provides effective techniques for properly obtaining, collecting, and storing digital media devices and evidence, as well as the knowledge to recognize different types and styles of mobile devices and portable media storage. Participants will learn techniques that assist in identifying, tracking, and apprehending the predators who use these devices as methods for exploiting victims.

ICAC-SIT Cell Phone Investigation, Collection, and Law Training (Apr 2013)

This three-day course provides crucial skills for investigators and first responders responsible for handling cellular and other mobile devices. The course provides effective techniques for properly obtaining, collecting, and storing digital media devices and evidence, as well as the knowledge to recognize different types and styles of mobile devices and portable media storage. Participants will learn techniques that assist in identifying, tracking, and apprehending the predators who use these devices as methods for exploiting victims.

ICAC-SIT Cell Phone Investigation, Collection, and Law Training (Mar 2013)

This three-day course provides crucial skills for investigators and first responders responsible for handling cellular and other mobile devices. The course provides effective techniques for properly obtaining, collecting, and storing digital media devices and evidence, as well as the knowledge to recognize different types and styles of mobile devices and portable media storage. Participants will learn techniques that assist in identifying, tracking, and apprehending the predators who use these devices as methods for exploiting victims.

ICAC-SIT Cell Phone Investigation, Collection, and Law Training (Feb 19, 2013)

This three-day course provides crucial skills for investigators and first responders responsible for handling cellular and other mobile devices. The course provides effective techniques for properly obtaining, collecting, and storing digital media devices and evidence, as well as the knowledge to recognize different types and styles of mobile devices and portable media storage. Participants will learn techniques that assist in identifying, tracking, and apprehending the predators who use these devices as methods for exploiting victims.

Pages