Training

Webinar - Peer Recovery Support Services – Options, Opportunities, and Challenges for Jurisdictions

The Bureau of Justice Assistance (BJA) leadership, in collaboration with the Comprehensive Opioid Abuse Program (COAP) team, invites you to this no-cost webinar on February 27, 2018 at 2:00 p.m. ET to learn how peer recovery support services are helping jurisdictions across the country address the opioid epidemic, bringing help and hope to individuals and families.

NW3C FC 141 - Human Trafficking Awareness for Law Enforcement Officers (Feb 2018)

"Human Trafficking Awareness for Law Enforcement Officers" is an interactive e-learning course designed to provide law enforcement officers with an overview of human trafficking. Completing this course will contribute to the student’s understanding of the various elements involved in human trafficking.

NW3C-FC-115 Introduction to Mortgage Fraud (MORF) (Feb 2018)

The "Introduction to Mortgage Fraud" web-based course (MORF-WB) presents awareness-level information on mortgage fraud. The course covers basic definitions and terminology, common types of mortgage fraud schemes, components of fraud, roles in the mortgage process, and legal explanations. Students will also learn to recognize fraud indicators associated with a variety of schemes and opportunities to commit fraud throughout the mortgage process. A sample mortgage loan application and other forms used in the process are available to download within this course.

Webinar - CTAS FY 2018: Funding Opportunities for Healing to Wellness Courts

This webinar will provide a brief overview of Healing to Wellness Court funding opportunities available within the fiscal year 2018 Coordinated Tribal Assistance Solicitation (CTAS). This webinar focuses primarily on Purpose Areas 3 and 8, which can include funding for adult, family, and juvenile Healing to Wellness Courts. The webinar details the CTAS application process, updates from last year, important considerations for drafting a Wellness Court narrative, general grant writing tips, and available technical assistance.

Cybercrime and Defenses: A 101 Introduction To How It Works (February 2018)

The news seems to be filled with stories of ransomware locking out entire departments from their computers, distributed denial-of-service (DDoS) attacks shutting down websites, and data dumps containing passwords or other sensitive information. Trying to understand these attacks can seem overwhelming, almost like learning a foreign language, but it does not have to.

CP HUNT - "How To Hunt" Criminals and Terrorists: The Actionable Intelligence Workshop

This one-day workshop is designed to instruct police department commanders, their police officers assigned to both patrol and investigative functions, and their analysts on how to aggressively collect and use actionable intelligence. The same intelligence techniques can be used against both criminal and terrorist targets. The intelligence training taught in this workshop is designed to supplement the existing operational professionalism, skills, and experience within the audience.

Key Modules:

CP IIT - Internet Intelligence Training: Social Media EXPLOITATION (Jun 2018)

This two-day course offers a comprehensive program to Internet investigations and open source intelligence gathering. Students will learn how to enhance their search skills to effectively use Internet resources for locating information online.

Key Learning Points:

CP IIT - Internet Intelligence Training: Social Media EXPLOITATION (Mar 2018)

This two-day course offers a comprehensive program to Internet investigations and open source intelligence gathering. Students will learn how to enhance their search skills to effectively use Internet resources for locating information online.

Key Learning Points:

Webinar: Networks of Criminals (NOC) Youth Offender Program - IACA Innovations in Crime Analysis Award Winner

The Networks of Criminals (NOC) Youth Offender Program is an innovative offender-based strategy and intelligence process that utilizes an algorithmic methodology to identify youth offenders and their social networks currently impacting Milwaukee’s motor vehicle theft and robbery trends. NOC offenders are identified every week using a unique methodology for the comparative analysis of up to 500 emerging or perpetual like-offenders based on their 1) criminal history, 2) threat assessment, and 3) social network analysis.

Pages