Skip to main content

Training Delivery - Live Video (VTC)

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20250403-83157-61

Submitted by Samantha Noel … on

On May 22, 2025, at 2:00pm ET, the RVCRI team will host the eighth Rural Roundtable – a peer networking event for RVCRI grantees to come together and discuss persons in crisis.

20250214-75920-77

Submitted by Bryan Lee Dail on
This course introduces the problem of intellectual property theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft.

20250214-75916-88

Submitted by Bryan Lee Dail on
This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve digital evidence at a crime scene. Topics include recognizing potential sources of digital evidence; planning and executing a digital evidence-based seizure; and the preservation, packaging, documentation, and transfer of digital evidence. *Prepare. Prepare to respond to an incident or crime scene where digital evidence may be present. *Identify. Learn tow to identify relevant sources of digital evidence in an ever-evolving landscape. *Collect.

20250214-75910-78

Submitted by Bryan Lee Dail on
This three-day course covers the fundamentals of financial investigations and incorporates some of the more advanced processes that elevate an investigation. During this course, students will learn about investigative processes, practical tools, and sources of information necessary to plan and conduct financial investigations. The course begins with a description of the basic composition of elements within illicit financial networks and how they work to compromise legitimate business and financial sectors.

20250214-75905-62

Submitted by Bryan Lee Dail on
This course covers the identification and extraction of artifacts associated with the Microsoft Windows operating system. Topics include the Change Journal, BitLocker, and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs, Volume Shadow Copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

20250212-74157-96

Submitted by Bryan Lee Dail on
This one-day course provides foundational spreadsheeting knowledge and skills to enhance workplace productivity. The course covers basic navigation of Microsoft Excel by combining live demonstrations and hands-on exercises. Work with multiple worksheets within a workbook Hide, unhide, and protect worksheets Adjust rows and columns Use copy and paste options Find, select, and sort data

20250211-141859-25

Submitted by Ms. Jana Brasw… on

The January meeting brought together subject matter experts, coaches, and stakeholders to discuss strategies for implementing effective programs addressing substance use disorder in jails. Participants explored best practices, common barriers, and solutions, with insights from law enforcement and healthcare professionals. The meeting also introduced team assessments to guide data-driven decision-making and foster collaboration.

Subscribe to Training Delivery - Live Video (VTC)