Tribal Justice Agencies

CI101 Basic Cyber Investigations: Digital Footprints (July 20, 2021, Virtual)

This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individual’s digital footprint, protecting privacy on social media, and the consequences of oversharing personal information, as well as steps to take after becoming a target of doxing.

DF100 Basic Digital Forensic Analysis: Seizure (July 21, 2021, Virtual)

This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve digital evidence at a crime scene. Topics include recognizing potential sources of digital evidence; planning and executing a digital evidence-based seizure; and the preservation, packaging, documentation, and transfer of digital evidence

DF310 Advanced Digital Forensic Analysis: Windows (July 26–29, 2021, Virtual)

This course covers the identification and extraction of artifacts associated with the Microsoft Windows operating system. Topics include the Change Journal, BitLocker, and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs, Volume Shadow Copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

CI101 Basic Cyber Investigations: Digital Footprints (July 28, 2021, Virtual)

This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individual’s digital footprint, protecting privacy on social media, and the consequences of oversharing personal information, as well as steps to take after becoming a target of doxing.

DF320 Advanced Digital Forensic Analysis: macOS (July 26–29, 2021, Virtual)

This course prepares students to identify various artifacts typically located in property lists and SQLite databases on MacOS-based computers, and teaches students how to perform forensic analysis. Students gain hands-on practical experience writing basic SQL queries and using them to analyze operating system artifacts that include, but are not limited to, user login passwords, FaceTime, messages, mail, contacts, calendars, reminders, notes, photos, Safari, Google Chrome, and Mozilla Firefox.

Ask the Expert Session: Neurobiology of Addiction – Beyond the Basics

Join the National Criminal Justice Training Center (NCJTC) of Fox Valley Technical College (FVTC) for their webinar “Ask the Expert Session: Neurobiology of Addition – Beyond the Basics” on May 4, 2021 at 2:00–3:30 p.m. ET. This session, designed for tribes and tribal partners, will feature a “facilitated discussion and open forum with subject matter experts who will answer your practical questions regarding working with the impacts of addiction on the brain.” The organizers will collect feedback on topics to address and active participation is encouraged.

Webinar: Springtime SQLite Survival Series Part 1: SQLite Statements and Structures

SQLite is a self-contained, serverless database engine. It is found on nearly every operating system and dominates iOS, Android, and macOS as one of the most prevalent and relevant data storage mechanisms. Join Maggie Gaffney (Teel Tech) and Chris Atha (National White Collar Crime Center) for part one in their three-part Springtime SQLite Survival Series. Part I SQLite Statements and Structures will focus on an explanation of SQLite and how it functions. Furthering this knowledge, a crash course explaining the usage of the SQL language to enhance your SQLite-based investigations will finish the presentation. Applicable attendees will receive a four-month license for Sandersons Forensics SQLite Explorer. Stay tuned for an interactive question and answer session and information about Part II.

DF201 Intermediate Digital Forensic Analysis: Automated Forensic Tools (Apr. 26–29, 2021)

This course provides students with the fundamental knowledge and skills necessary to perform a limited digital forensic examination, validate hardware and software tools, and effectively use digital forensic suites and specialized tools. The course begins with a detailed review of the digital forensic examination process, including documentation, case management, evidence handling, validation, and virtualization. Students learn to use today's leading commercial and open source digital forensic suites: Magnet Axiom, X-ways Forensic, and Autopsy. Instruction on each suite will include an interface overview, configuration, hashing, file signature analysis, keyword searching, data carving, bookmarking, and report creation.

FC110 Financial Crimes Against Seniors (Virtual, May 5–6, 2021)

This course promotes a multiagency approach to the problem of financial exploitation of senior citizens. Bringing together law enforcement personnel and adult protective services investigators, the course enhances students' investigative skills and interviewing techniques while facilitating networking and cooperation that can extend out of the classroom and into real cases. Topics include recognizing elder abuse, working with victims, and identifying perpetrators, as well as resources for investigation and community awareness. Students work together to conduct a mock investigation into a hypothetical case.

Pages