Prosecutors

DF100 Basic Digital Forensic Analysis: Seizure (Oct. 6, 2020, Virtual)

This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve digital evidence at a crime scene. Topics include recognizing potential sources of digital evidence; planning and executing a digital evidence-based seizure; and the preservation, packaging, documentation, and transfer of digital evidence.

CI240 Intermediate Cyber Investigations: Virtual Currency (Oct. 13, 2020, Virtual)

This course provides students with the fundamental knowledge and skills they need to investigate crimes involving virtual currency. Instructors explain foundational concepts like the characteristics of money, virtual currency, and cryptocurrency. Blockchain technology, proof work, and proof of stake are covered, and students learn how industry-leading cryptocurrencies (Bitcoin, Ethereum, and Monero) work and how they differ from each other. Finally, students learn investigative techniques for tracking and documenting transactions and best practices for seizing and securing cryptocurrency.

DF330 Advanced Digital Forensic Analysis: iOS & Android (Oct. 13, 2020, Virtual)

This course provides the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically sound tools and techniques to analyze potential evidence, employing advanced techniques to uncover evidence potentially missed or misrepresented by commercial forensic tools. Topics include identifying potential threats to data stored on devices, using available acquisition options, accessing locked devices, and understanding the default folder structure. Core skills include analyzing artifacts such as device information, call history, voicemail, messages, web browser history, contacts, and photos. Instruction is provided on developing the "hunt" methodology for analyzing third-party applications not supported by commercial forensic tools.

Webinar – Part II: Now That You’ve Got it and Can Read It, What Can You Do With It?

Join AEquitas, in partnership with the Denver District Attorney’s Office, for a two-part webinar that will explore the scope of data available from sources of digital evidence and strategies on how such data can effectively be identified and preserved with forensically sound practices. Presenters will discuss theories of admission, rules of evidence, and “real life” examples to demonstrate how to properly obtain, search, authenticate, and introduce digital evidence in court proceedings.

Webinar – Part I: The Investigative Stage—Recognition, Collection, Search

Join AEquitas, in partnership with the Denver, Colorado District Attorney’s Office, for a two-part webinar that will explore the scope of data available from sources of digital evidence and strategies on how such data can effectively be identified and preserved with forensically sound practices. Presenters will discuss theories of admission, rules of evidence, and “real life” examples to demonstrate how to properly obtain, search, authenticate, and introduce digital evidence in court proceedings.

Building an Effective Insider Risk Management Program Part 1

This session will discuss strategies for building, implementing, and operating an effective insider risk management program that is integrated into an organization-wide enterprise risk management strategy. Best practices will be discussed addressing prevention, detection, investigation, and response strategies to reduce the risk of malicious and non-malicious insiders impacting the critical assets of your organization. 

Presented by Randy Trzeciak, Director National Insider Threat Center; CERT Division, Software Engineering Institute

Technical Detection Methods for Insider Risk Mitigation Part 2

Effective insider risk mitigation requires the collection, aggregation, and analysis of data from a multitude of data sources within an organization. In this webinar, the presenter will provide an overview of the current state of the practice in technical detection methods for insider risk mitigation and present strategies organizations can use to protect their critical assets from insider misuse. 

Presented by Dan Costa, Technical Manager, CERT National Insider Threat Center

Deciphering Cryptocurrency: A Technical and Criminal Law Approach

Starting with a basic overview of cryptocurrencies, this webinar will focus on some of the more technical aspects of the crypto industry. Additionally, this webinar will look at criminals' abilities to use cryptocurrency, the potential future of crypto, and considerations for how to seize cryptocurrency as part of criminal investigations.

Intelligence Sharing: Effectively Combat Money Laundering

Laundering being missed? Law enforcement and government agencies globally have examples of intelligence failures that could have led to offenders being brought to justice earlier if relevant data had been shared between partners. In this webinar, the presenter will discuss whether there are means of more effectively sharing intelligence to fight financial crime and criminals.

DFIR Dictionary Part 1

Merriam-Webster is our go-to source for thousands of definitions. Digital Forensics and Incident Response (DFIR) use terms that are not typically defined in mainstream dictionaries. A quick review of any common listserve reveals a lexicon of hundreds, if not thousands, of unique terms and words. This webinar series will start with the most basic of DFIR definitions and build upon them. The webinar content will be rooted in empirical facts with a misting of industry history and professional experiences.

Pages