Skip to main content

Prosecutors

Questions?

CI240 Intermediate Cyber Investigations: Virtual Currency (Oct. 13, 2020, Virtual)

This course provides students with the fundamental knowledge and skills they need to investigate crimes involving virtual currency. Instructors explain foundational concepts like the characteristics of money, virtual currency, and cryptocurrency. Blockchain technology, proof work, and proof of stake are covered, and students learn how industry-leading cryptocurrencies (Bitcoin, Ethereum, and Monero) work and how they differ from each other. Finally, students learn investigative techniques for tracking and documenting transactions and best practices for seizing and securing cryptocurrency.

DF205 Intermediate Digital Forensic Analysis: SQLite Primer (Oct. 7, 2020, Virtual)

Mobile devices dominate the intake list and the desks of most digital forensics analysts globally. Devices are becoming more secure. With an increase in security, the need for detailed analysis is increasing as well. SQLite is a self-contained, serverless database engine. It is found on nearly every operating system and dominates iOS, Android, and macOS as one of the most prevalent and relevant data storage mechanisms. Rather than hope our forensic tools support the newest applications or be tethered to how a certain utility parses data, we can arm ourselves with the skills and techniques needed to conquer the analysis of nearly any application.

FC101 Financial Investigations Practical Skills (Oct. 6, 2020, Virtual)

This course provides hands-on investigative training at a basic level. Students develop the practical skills, insight, and knowledge necessary to manage a successful financial investigation from start to finish, including the acquisition and examination of financial records, interview skills, and case management and organization. Additional topics include forgery and embezzlement, financial exploitation of the elderly, working with spreadsheets, financial profiling, and state-specific statutes and legal issues. 

FC105 Financial Records Examination and Analysis (Oct. 2020, Virtual)

This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis and pattern recognition, and financial profiling. There is a strong focus on presenting financial evidence in multiple modalities: spreadsheet data outputs, graphic representations, and written/oral presentations.

DF100 Basic Digital Forensic Analysis: Seizure (Oct. 6, 2020, Virtual)

This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve digital evidence at a crime scene. Topics include recognizing potential sources of digital evidence; planning and executing a digital evidence-based seizure; and the preservation, packaging, documentation, and transfer of digital evidence.

DF201 Intermediate Digital Forensic Analysis: Automated Forensic Tools (Oct. 5, 2020, Virtual)

This course provides students with the fundamental knowledge and skills necessary to perform a limited digital forensic examination, validate hardware and software tools, and effectively use digital forensic suites and specialized tools. The course begins with a detailed review of the digital forensic examination process, including documentation, case management, evidence handling, validation, and virtualization. Students learn to use today's leading commercial and open source digital forensic suites: Magnet Axiom, X-ways Forensic, and Autopsy. Instruction on each suite will include an interface overview, configuration, hashing, file signature analysis, keyword searching, data carving, bookmarking, and report creation.

Webinar – Part II: Now That You’ve Got it and Can Read It, What Can You Do With It?

Join AEquitas, in partnership with the Denver District Attorney’s Office, for a two-part webinar that will explore the scope of data available from sources of digital evidence and strategies on how such data can effectively be identified and preserved with forensically sound practices. Presenters will discuss theories of admission, rules of evidence, and “real life” examples to demonstrate how to properly obtain, search, authenticate, and introduce digital evidence in court proceedings.

Webinar – Part I: The Investigative Stage—Recognition, Collection, Search

Join AEquitas, in partnership with the Denver, Colorado District Attorney’s Office, for a two-part webinar that will explore the scope of data available from sources of digital evidence and strategies on how such data can effectively be identified and preserved with forensically sound practices. Presenters will discuss theories of admission, rules of evidence, and “real life” examples to demonstrate how to properly obtain, search, authenticate, and introduce digital evidence in court proceedings.

Technical Detection Methods for Insider Risk Mitigation Part 2

Effective insider risk mitigation requires the collection, aggregation, and analysis of data from a multitude of data sources within an organization. In this webinar, the presenter will provide an overview of the current state of the practice in technical detection methods for insider risk mitigation and present strategies organizations can use to protect their critical assets from insider misuse. 

Presented by Dan Costa, Technical Manager, CERT National Insider Threat Center

Subscribe to Prosecutors