Military

Cybercop 325 - Macintosh Forensic Analysis (May 2018)

The "Cybercop (CC) 325 - Macintosh Forensics Analysis" (MFA) course provides the fundamental knowledge and skills necessary to identify and collect volatile data, acquire forensically-sound images of Apple Macintosh computers, and perform forensic analysis of the macOS operating system and application artifacts. Students gain hands-on experience scripting and using automated tools to conduct a simulated live triage. Students will use multiple methods to acquire forensically-sound images of Apple Macintosh computers and identify unique challenges that this task may present.

CI 201 - Social Media & Open Source Intelligence (May 10 2018)

This course covers the skills investigators need to conduct successful online investigations involving social media. Topics include internet basics, such as IP addresses and domains; an overview of currently popular social media platforms; and best practices for building an online undercover profile. Instructors will demonstrate both open-source and commercially-available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites.

Cybercop 101 Basic Digital Forensic Imaging BDFI (May 2018)

This course covers the fundamentals of computer operations, hardware function, and configuration, as well as best practices for the protection, preservation, and imaging of digital evidence. Presentations and hands-on exercises cover topics such as partitioning, data storage, hardware and software write blockers, boot-up and shutdown processes, live imaging, encryption detection, and duplicate imaging. This course incorporates computer forensic applications that experienced practitioners are currently using in the field.

Course structure:

Cyber Investigation 101 Secure Techniques for Onsite Preview - STOP (May 8 2018)

The "Cyber Investigation (CI) 101 - Secure Techniques for Onsite Preview" course covers the usage and configuration of two tools (Paladin/Autopsy and osTriage) designed to preview a non-mobile digital device and export files of evidentiary value. DAY ONE is designed to preview a non-mobile digital device and export files of evidentiary value from a device that is powered on. DAY TWO is designed to preview a non-mobile digital device and export files of evidentiary value from a device that is powered off.

Cyber Investigation 150 Introduction to Cellular Investigations ICI (May 2018)

This course covers the acquisition and analysis of the various types of call detail records obtained from cellular providers. It focuses on data analysis using Microsoft Excel, as well as techniques for presenting findings in case reports or in court. Students receive a copy of PerpHound, the National White Collar Crime Center's (NW3C) free software tool for the analysis of call detail records. This course also covers best practices for seizing, preserving, and acquiring evidence internal to a cellular phone.

NW3C FC 101-Financial Investigations Practical Skills (FIPS) (May 2018)

The "Financial Crime (FC) 101 - Financial Investigations Practical Skills" (FIPS) course provides hands-on training at a basic level. Students develop the practical skills, insight, and knowledge necessary to manage a successful financial investigation from start to finish, including the acquisition and examination of financial records, interview skills, and case management and organization. Additional topics include securities fraud, insurance fraud, financial exploitation of the elderly, financial profiling, and state-specific statutes and legal issues.

NW3C-FC 105 - Financial Records Examination and Analysis (FREA) (May 2018)

The "Financial Crime (FC) 105 - Financial Records Examination and Analysis" (FREA) course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis and pattern recognition, and financial profiling. There is a strong focus on presenting financial evidence in multiple modalities: spreadsheet data outputs, graphic representations, and written/oral presentations.

CP IIT - Internet Intelligence Training: Social Media EXPLOITATION (Jul 2018)

This two-day course offers a comprehensive program to Internet investigations and open-source intelligence gathering. Students will learn how to enhance their search skills to effectively use Internet resources for locating information online. 

Key Learning Points:

CP IIT - Internet Intelligence Training: Social Media EXPLOITATION (May 2018)

This two-day course offers a comprehensive program to Internet investigations and open source intelligence gathering. Students will learn how to enhance their search skills to effectively use Internet resources for locating information online.

Key Learning Points:

Intel Collection Part 2: Tips, Tricks and Techniques for Intel Collection

With the vast amount of data available and the calls for stopping law enforcement's access to data, this two-part webinar series will act as a guide through it all. Part two will cover tracking and using international phone numbers, Internet Protocol addresses, social media tools and techniques, tips for legal process to social media companies, and free law enforcement tools. The webinar will also discuss rules for using social media in investigations.

Pages