Training

Cybercop 325 - Macintosh Forensic Analysis

The "Cybercop (CC) 325 - Macintosh Forensics Analysis" (MFA) course provides the fundamental knowledge and skills necessary to identify and collect volatile data, acquire forensically-sound images of Apple Macintosh computers, and perform forensic analysis of the macOS operating system and application artifacts. Students gain hands-on experience scripting and using automated tools to conduct a simulated live triage. Students will use multiple methods to acquire forensically-sound images of Apple Macintosh computers and identify unique challenges that this task may present.

Cybercop 315 Windows Artifacts - WinArt

The "Cybercop (CC) 315 Windows Artifacts - WinArt" (WinArt) course covers the identification and extraction of artifacts associated with the current versions of Microsoft Windows operating systems (Vista through Windows 10) and the New Technology file system. Topics include the change journal, BitLocker, and a detailed examination of the various artifacts found in each of the registry hive files. Students examine event logs, volume shadow copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

Cyber Investigation 156 - Post Seizure Evidentiary Concerns - LC6 WB

In contrast to the other LCDE modules, which deal primarily with the acquisition of digital evidence, LC6-WB addresses legal issues that appear relatively late in the investigative and judicial process. Topics include the Fifth Amendment as it applies to passwords and login credentials, determining the ownership of files on digital devices, and the admissibility of online evidence.

LC6-WB is the sixth of seven modules in the training series Legal Concerns for Digital Evidence Responders. It can be completed as a stand-alone course or in combination with the other six modules.

Cyber Investigation 101 - Secure Techniques for Onsite Preview (Jan 2018)

The "Cyber Investigation (CI) - Secure Techniques for Onsite Preview" course covers the usage and configuration of two tools (Paladin/Autopsy and osTriage) designed to preview a non-mobile digital device and export files of evidentiary value. DAY ONE is designed to preview a non-mobile digital device and export files of evidentiary value from a device that is powered on. DAY TWO is designed to preview a non-mobile digital device and export files of evidentiary value from a device that is powered off.

Cyber Investigation 157 - Mobile Digital Devices & GPS Web-based (Oct 2017)

"Cyber Investigation 157 - Mobile Digital Devices & GPS" (LC7-WB) addresses the legal issues surrounding mobile digital devices, including cell phones and GPS devices. Topics include seizing and searching mobile devices, the process of obtaining both historical and current location information from cellular service providers, and the legal process needed to install a GPS unit on a suspect’s vehicle. LC7-WB is the seventh of seven modules in the training series Legal Concerns for Digital Evidence Responders.

Cybercop 350 Mobile Device Forensic Analysis (Oct 2017)

The "Cybercop (CC) 350 - Mobile Device Forensic Analysis" (MDFA) course provides the fundamental knowledge and skills necessary to preserve, acquire, and analyze data on iOS devices (iPod Touch, iPhone, and iPad), as well as various Android devices. Students use forensically sound tools and techniques to acquire and analyze potential evidence. Topics include identifying potential threats to data stored on devices, available imaging options, accessing locked devices, and the default folder structure.

Cyber Investigation 201 - Social Media & Open Source Investigations SMOSI

The "Cyber Investigations 201 - Social Media & Open Source Investigations" (SMOSI) course covers the skills investigators need to conduct successful online investigations involving social media. Topics include internet basics, such as IP addresses and domains; an overview of currently popular social media platforms; and best practices for building an online undercover profile.

Cyber Investigation 105 Cell Phone Mapping & Analysis CPMA

This two-day course is for officers, investigators, and analysts that encounter cell phone evidence that includes the acquisition and analysis of information external to the phone. Class concepts include instruction on how to request, read, and analyze Call Detail Records from cellular providers, as well as how to plot cellular site locations to determine the approximate position of a suspect during a given time frame.

Drone Forensics 101: Extracting & Examining Data from Drones

The National White Collar Crime Center (NW3C) understands how important it is for law enforcement professionals to be up to speed on emerging technologies. In recent months, drones have been a subject of controversy and are being used more frequently by criminals. These devices store data and need to be handled appropriately. Active cases are currently being prosecuted in border, battlefield, and correctional facility scenarios. Having the capability to quickly recover and analyze data from drones has become critically important.

Cybercop 201 - Intermediate Data Recovery and Analysis - IDRA

The "Cybercop (CC) 201 - Intermediate Data Recovery and Analysis" (IDRA) course builds on the concepts introduced in "CC 101 - Basic Data Recovery and Acquisition" (BDRA). This course covers the architecture and functionality of the Windows NT File System (NTFS), the FAT File System, and related directory entry information for locating files on electronic devices. Topical areas include file headers and file hashing, recovery of deleted files and long file names, and techniques for discovering potential evidence that might otherwise be overlooked.

Pages