Training

DF330 Advanced Digital Forensic Analysis: iOS & Android (Oct. 13, 2020, Virtual)

This course provides the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically sound tools and techniques to analyze potential evidence, employing advanced techniques to uncover evidence potentially missed or misrepresented by commercial forensic tools. Topics include identifying potential threats to data stored on devices, using available acquisition options, accessing locked devices, and understanding the default folder structure. Core skills include analyzing artifacts such as device information, call history, voicemail, messages, web browser history, contacts, and photos. Instruction is provided on developing the "hunt" methodology for analyzing third-party applications not supported by commercial forensic tools.

Webinar – Using Social Media for Recruiting: Targeted Messaging in Law Enforcement

Throughout the nation, law enforcement organizations use a variety of strategies to recruit qualified applicants. Despite these efforts, many organizations struggle to fill vacancies. This issue may, in part, relate to reliance on outdated recruiting methods. Social media has transformed the way in which organizations in other fields market to customers and potential employees alike. While some law enforcement organizations use social media, few organizations leverage research to develop tailored social media marketing strategies.

Webinar – Part II: Now That You’ve Got it and Can Read It, What Can You Do With It?

Join AEquitas, in partnership with the Denver District Attorney’s Office, for a two-part webinar that will explore the scope of data available from sources of digital evidence and strategies on how such data can effectively be identified and preserved with forensically sound practices. Presenters will discuss theories of admission, rules of evidence, and “real life” examples to demonstrate how to properly obtain, search, authenticate, and introduce digital evidence in court proceedings.

Webinar – Part I: The Investigative Stage—Recognition, Collection, Search

Join AEquitas, in partnership with the Denver, Colorado District Attorney’s Office, for a two-part webinar that will explore the scope of data available from sources of digital evidence and strategies on how such data can effectively be identified and preserved with forensically sound practices. Presenters will discuss theories of admission, rules of evidence, and “real life” examples to demonstrate how to properly obtain, search, authenticate, and introduce digital evidence in court proceedings.

Webinar – “Police Report Writing in Tribal Domestic and Sexual Assault Cases”

Join TA2TA on September 21, 2020 for their free law enforcement training on “Police Report Writing in Tribal Domestic and Sexual Violence Cases.” Dr. James D. Diamond, Dean of Academic Affairs at the National Tribal Trial College, will provide practical tips on documenting witness and suspect statements, overcoming hearsay, and diagramming the crime scene to increase successful prosecution and conviction rates. This one-hour course is sponsored by the U.S.

Technical Detection Methods for Insider Risk Mitigation Part 2

Effective insider risk mitigation requires the collection, aggregation, and analysis of data from a multitude of data sources within an organization. In this webinar, the presenter will provide an overview of the current state of the practice in technical detection methods for insider risk mitigation and present strategies organizations can use to protect their critical assets from insider misuse. 

Presented by Dan Costa, Technical Manager, CERT National Insider Threat Center

Building an Effective Insider Risk Management Program Part 1

This session will discuss strategies for building, implementing, and operating an effective insider risk management program that is integrated into an organization-wide enterprise risk management strategy. Best practices will be discussed addressing prevention, detection, investigation, and response strategies to reduce the risk of malicious and non-malicious insiders impacting the critical assets of your organization. 

Presented by Randy Trzeciak, Director National Insider Threat Center; CERT Division, Software Engineering Institute

Webinar: “Using Data and Performance Measurement to Improve Criminal Justice Outcomes”

The criminal justice system in the United States produces vast amounts of data daily. However, these data are rarely used by agencies beyond the tracking of individual cases. Measures for Justice (MFJ) has developed a system that leverages the data already collected by local agencies to assess the health of the criminal justice system at the county level. This webinar will discuss the importance of using data to identify problematic patterns that need correction as well as best practices that could be replicated.

Webinar – “Implementing a Peer Mentor Program: Strategies for Engaging Peer Recovery Support Specialists in Adult Treatment Courts”

Peer Recovery Support Specialists (PRSSs) working in treatment courts are people with lived experience of behavioral health disorders and criminal justice involvement who are key members of the clinical team serving those participating in drug court and mental health court programs.

This webinar covers strategies for how to engage PRSSs in adult treatment courts to support people with substance use disorders and co-occurring mental disorders. Topics covered will include:

Webinar: “Trauma—Getting off the Emotional X”

Most officers know the expression “get off the X,” the idea that remaining in one spot during a gunfight cannot only be dangerous, it can be deadly. This webinar will assist participants in addressing the after-effects of job exposure to violence. “Getting off the emotional X” (a phrase coined by Dr. Olivia Johnson) is the idea that staying in a place of emotional conflict and turmoil can increase the likelihood of negative outcomes. Operating in this emotionally turbulent state can become habitual.

Pages