Skip to main content

Training Delivery - Webinar

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20201103-143658-18

Submitted by Bryan Lee Dail on

NW3C offers daily Capture The Flag (CTF) Challenges at https://nw3.ctfd.io/ . Challenges are designed to help forensic examiners hone, refine, and practice their skills. The CTF scoreboard encourages friendly competition. Solution videos are available following the challenge conclusions.

20201103-135920-83

Submitted by Bryan Lee Dail on

Our online world and the use of electronic devices have led to most of our interactions in the online world. Technology contributes to people?'s perception of things being real when they are not.This has enabled people to be manipulated through the Art of Social Engineering.

20201103-135912-32

Submitted by Bryan Lee Dail on

Effective insider risk mitigation requires the collection, aggregation, and analysis of data from a multitude of data sources within an organization. In this presentation, we will present an overview of the current state of the practice in technical detection methods for insider risk mitigation, and present strategies organizations can use to protect their critical assets from insider misuse.

20201103-135905-21

Submitted by Bryan Lee Dail on

The essence of any good investigation, is the conviction of the person's responsible for committing those crimes. This Webinar will focus on testifying in court and the post arrest process in preparing for trial. This webinar will also focus on what to incorporate or not incorporate in your reports. We will discuss how to negate arguments made by defense counsel, how to testify, how to be more credible, how to prepare and ultimately set yourself up for success in any trial. Different types of court proceedings and strategies will also be discussed.

20201103-135848-17

Submitted by Bryan Lee Dail on

It is widely acknowledged that Phishing is responsible for >90% of breaches occurring today. Basic phishing primarily exploits human behavior to entice a victim to ?'click the link?' or ?'open the attachment?' thus often handing over to the criminal the golden nugget ?- valid access credentials. While we are all taught not to click or open the attachment, the scheme is still highly successful and profitable.

20201103-135840-88

Submitted by Bryan Lee Dail on

Have you ever wondered what people are saying through their body language? This Webinar will focus on nonverbal behavior and one's ability to "read" people. This Webinar will enhance your ability to decode emotions and behaviors and look for deceptive behaviors. You will also learn how your body language can influence what others around you think.

20201103-135832-36

Submitted by Bryan Lee Dail on

The process of acquiring forensic images is well understood, and the industry has never been better equipped for the analysis. However common practices are set to fail, and analysis may be missing malware and indicators of compromise. This webinar will highlight short comings in commons methods and provide a framework for an improved approach; to allow for more efficient and thorough investigations.

20201103-135825-52

Submitted by Bryan Lee Dail on

What is there to know about credit card fraud? Everything! Join us for an interactive presentation discussing the three main types of credit card fraud (Transaction fraud, Identity fraud and Payment fraud). There will be content on cyber fraud, the dark web and how that world operates. We?'ll also discuss trends in the industry and how Capital One can assist in your investigations.

20201103-135817-93

Submitted by Bryan Lee Dail on

The year 2020 has brought an onslaught of new challenges in the criminal justice world! While officer wellness has always been an important topic, it is especially critical now. During this webinar we will share the experience of two law enforcement professionals who know the importance and necessity of wellness and mental health programs for criminal justice professionals. Audience interaction will also determine the topics for our next wellness webinars.

20201103-135808-49

Submitted by Bryan Lee Dail on

Data of evidentiary value in criminal cases is generated both on the suspect device and the services it utilizes. While recovery of data from the suspect device is regularly performed, user account data stored off-device from these services often remains overlooked. This overlooked data is increasingly becoming crucial evidence in cases. In this webinar, we will manually review a Facebook search warrant return examining the different artifacts that can be provided within a return.

Subscribe to Training Delivery - Webinar