Training

Cyber Investigation 152 - Search Warrants & Digital Evidence Web-based (Oct 2017)

This course provides information on obtaining and executing search warrants in cases involving digital evidence, with a focus on the similarities and differences between these and other search warrants. The course covers:

APA Webinar - Strategies for Prosecuting Drug-Induced Homicide Cases

Join the Association of Prosecuting Attorneys for the webinar “Strategies for Prosecuting Drug-Induced Homicide Cases” on November 15. Opioid overdose deaths are increasing across the country. Some jurisdictions are charging dealers under drug-induced homicide statutes. Learn about the challenges, successes, and strategies - from investigations to sentencing - from veteran investigators and prosecutors in both strict liability and proximate cause jurisdictions.

Cybersecurity 235 - Basic Network Intrusion Investigations BNII (Sep 2017)

The "Cybersecurity (CS) 235 - Basic Network Intrustion Investigations" (BNII) course covers the skills and techniques involved in responding to a network security incident. The course focuses on the identification, extraction, and detailed examination of artifacts associated with network and intrusions. Memory analysis, host machine forensics, network traffic and log analysis, malware analysis, and virtual machine sandboxing are covered through lecture, discussion, and hands-on exercises.

Cybercop 350 Mobile Device Forensic Analysis (June 2018)

The "Cybercop (CC) 350 - Mobile Device Forensic Analysis" (MDFA) course provides the fundamental knowledge and skills necessary to preserve, acquire, and analyze data on iOS devices (iPod Touch, iPhone, and iPad), as well as various Android devices. Students use forensically sound tools and techniques to acquire and analyze potential evidence. Topics include identifying potential threats to data stored on devices, available imaging options, accessing locked devices, and the default folder structure.

Cybercop 250 Linux Open Source Forensics

The "Cybercop (CC) 250 Linux Open Source Forensics" course teaches students how to use free and open source software to conduct digital forensic examinations. Students learn to locate and install free Linux-based forensic software. After covering key forensic concepts as applied to open source software, basic forensic analysis techniques are covered.

Cybersecurity 235 - Basic Network Intrusion Investigations BNII (Feb - Mar 2018)

The "Cybersecurity (CS) 235 - Basic Network Intrusion Investigations" (BNII) course covers the skills and techniques involved in responding to a network security incident. The course focuses on the identification, extraction, and detailed examination of artifacts associated with network and intrusions. Memory analysis, host machine forensics, network traffic and log analysis, malware analysis, and virtual machine sandboxing are covered through lecture, discussion, and hands-on exercises.

Cybersecurity 235 - Basic Network Intrusion Investigations BNII (Feb 2018)

The "Cybersecurity (CS) 235 - Basic Network Intrustion Investigations" (BNII) course covers the skills and techniques involved in responding to a network security incident. The course focuses on the identification, extraction, and detailed examination of artifacts associated with network and intrusions. Memory analysis, host machine forensics, network traffic and log analysis, malware analysis, and virtual machine sandboxing are covered through lecture, discussion, and hands-on exercises.

Cyber Investigation 150 Introduction to Cellular Investigations ICI (Jan - Feb 2018)

The "Cyber Investigation (CI) 150 Introduction to Cellular Investigations" (ICI) course covers the acquisition and analysis of the various types of call detail records obtained from cellular providers. It focuses on data analysis using Microsoft Excel, as well as techniques for presenting findings in case reports or in court. Students receive a copy of PerpHound, National White Collar Crime Center's (NW3C) free software tool for the analysis of call detail records. This course also covers the best practices for seizing, preserving, and acquiring evidence internal to a cellular phone.

Pages