Training

DF201 Intermediate Digital Forensic Analysis: Automated Forensic Tools (Aug. 2020, Oklahoma)

This course provides students with the fundamental knowledge and skills necessary to perform a limited digital forensic examination, validate hardware and software tools, and effectively use digital forensic suites and specialized tools. The course begins with a detailed review of the digital forensic examination process, including documentation, case management, evidence handling, validation, and virtualization. Students learn to use today's leading commercial and open source digital forensic suites: Magnet Axiom, X-ways Forensic, and Autopsy. Instruction on each suite will include an interface overview, configuration, hashing, file signature analysis, keyword searching, data carving, bookmarking, and report creation.

DF330 Advanced Digital Forensic Analysis: iOS & Android (Aug. 2020, Ohio)

This course provides the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically sound tools and techniques to analyze potential evidence, employing advanced techniques to uncover evidence potentially missed or misrepresented by commercial forensic tools. Topics include identifying potential threats to data stored on devices, using available acquisition options, accessing locked devices, and understanding the default folder structure. Core skills include analyzing artifacts such as device information, call history, voicemail, messages, web browser history, contacts, and photos. Instruction is provided on developing the "hunt" methodology for analyzing third-party applications not supported by commercial forensic tools.

Training - VALOR’s “Mid-Level Leadership Workshop: Fostering an Organizational Culture of Safety and Wellness”

VALOR Officer Safety and Wellness Program is hosting the “Mid-Level Leadership Workshop: Fostering an Organizational Culture of Safety and Wellness,” which is open to currently sworn law enforcement officers. Attendees will receive a VALOR training certificate and are eligible to receive continuing education credit.

Webinar - Follow the Money: FinCrime Investigation Case Studies

Money laundering is a global, trillion-dollar crime that extends into all areas of commerce. Money laundering is not just a standalone crime, but is also a symptom of additional crimes that generate illicit proceeds. Whether due to lone wolf criminals, transnational organized crime, or international corruption, it can be challenging to prove money laundering as both a factual matter and as part of a criminal prosecution. 

This webinar will outline not only the essential elements of a criminal case of money laundering, but also examine how additional charges can be brought to flush out the elements of that charge. Learners will get a better understanding of the prosecutor's approach to money laundering (and its related crimes), as well as tools to follow the transactions that can substantiate such a charge. By moving from academic to applied subject matter, learners will gain insight into how to both trace illicit assets and to prepare their findings for criminal cases. The webinar will rely on real-world examples of financial crime and explain how cases like those can be further built out by investigators, analysts, and compliance officers.

IA101 Foundations of Intelligence Analysis Training (March 2020, South Carolina)

This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. Topics include the intelligence cycle, analytical thinking skills, the importance of strategic analysis, communication and social media analysis, recommendation development, and legal and ethical issues. Students work hands-on with specialized software to synthesize information and develop various products of intelligence. The course was developed by a consortium that included the National White Collar Crime Center, Law Enforcement Intelligence Unit, the International Association of Law Enforcement Intelligence Analysis, and the Regional Information Sharing System.

CI101 Basic Cyber Investigations: Digital Footprints (April 2020, Tennessee)

This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individual’s digital footprint, protecting privacy on social media, and the consequences of oversharing personal information, as well as steps to take after becoming a target of doxing.

CI101 Basic Cyber Investigations: Digital Footprints (May 2, 2020, Hendersonville, Tennessee)

This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individual’s digital footprint, protecting privacy on social media, and the consequences of oversharing personal information, as well as steps to take after becoming a target of doxing.

CI101 Basic Cyber Investigations: Digital Footprints (May 19, 2020, Hendersonville, Tennessee)

This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individual’s digital footprint, protecting privacy on social media, and the consequences of oversharing personal information, as well as steps to take after becoming a target of doxing.

CI101 Basic Cyber Investigations: Digital Footprints (June 2020, Tennessee)

This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individual’s digital footprint, protecting privacy on social media, and the consequences of oversharing personal information, as well as steps to take after becoming a target of doxing.

Pages