Webinar: Handling Informants
There are various ways to gain evidence for investigations whether they are proactive or reactive investigations. Informants prove a vital way to obtain evidence and information for your investigations. Handling Informants and their motivations requires a skillset in dealing with them in your investigations. This webinar will go over how to use informants for your investigations, how to document their information, negate defense arguments and be more efficient. We will discuss motivations, history and how to avoid pitfalls and mistakes.
Webinar: Top Resources for Physical, Financial, and Family Wellness in 2022
Having resources readily available allows you to be successful in wellness! A few of your favorite presenters will give you their top go-to resources on physical, financial, and family wellness. We will round out our discussion by introducing a FREE wellness app that includes all of the resources discussed in the webinar and much, much more. Join us and kick off your 2022 wellness with a bang!
DF101 Basic Digital Forensic Analysis: Windows Acquisition
This course provides the fundamental knowledge and skills required to acquire forensic backup images of commonly encountered forms of digital evidence (Microsoft Windows based computers and external storage devices) in a forensically sound manner. Presentations and hands-on practical exercises cover topics on storage media and how data is stored, the forensic acquisition process, tool validation, hardware and software write blockers, forensic backup image formats, and multiple forensic acquisition methods. Students will use third party tools, both free and commercial, that are currently used by practitioners in the field.
IA102 Introduction to Link Analysis
This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations. Introduction to Link Analysis (ILA) expands on the basic principles of link and association analyses explored in the Foundations of Intelligence Analysis Training (FIAT) while building a framework for more advanced methods such as social network analysis.
Expanding basic knowledge of link and association analysis
Explaining the process of social network analysis
Understanding the visual mapping and mathematical components associated with link and social network analyses
DF100 Basic Digital Forensic Analysis: Seizure
This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve digital evidence at a crime scene. Topics include recognizing potential sources of digital evidence; planning and executing a digital evidence-based seizure; and the preservation, packaging, documentation, and transfer of digital evidence.
*Prepare. Prepare to respond to an incident or crime scene where digital evidence may be present.
*Identify. Learn tow to identify relevant sources of digital evidence in an ever-evolving landscape.
*Collect. Learn the proper methods of digital evidence collection.
*Preserve. Build upon the three previous principles to ensure valid and legal preservation of digital evidence can occur.
CI240 Intermediate Cyber Investigations: Virtual Currency
This course provides students with the fundamental knowledge and skills they need to investigate crimes involving virtual currency. Instructors explain foundational concepts like the characteristics of money, virtual currency, and cryptocurrency. Blockchain technology, proof work, and proof of stake are covered; and students learn how industry-leading cryptocurrencies (Bitcoin, Ethereum, and Monero) work and how they differ from each other. Finally, students learn investigative techniques for tracking and documenting transactions; and best practices for seizing and securing cryptocurrency.
*Virtual currency basics. History of money and of virtual currency. Categorizing virtual currency.
*Blockchain. History of the blockchain. Understanding different protocols.
*Cryptocurrencies in detail. Bitcoin, Ethereum, Monero and other privacy coins.
*Investigative techniques. Seizing virtual currency; tracking transactions through the blockchain; documenting investigative results.