Training

DF100 Basic Digital Forensic Analysis: Seizure (March 24, 2021, Virtual)

This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve digital evidence at a crime scene. Topics include recognizing potential sources of digital evidence; planning and executing a digital evidence-based seizure; and the preservation, packaging, documentation, and transfer of digital evidence.

CI101 Basic Cyber Investigations: Digital Footprints (March 24, 2021, Virtual)

This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individual’s digital footprint, protecting privacy on social media, and the consequences of oversharing personal information, as well as steps to take after becoming a target of doxing.

DF320 Advanced Digital Forensic Analysis: macOS (March 29–April 1, 2021, Virtual)

This course teaches students to identify and collect volatile data, acquire forensically sound images of Apple Macintosh computers, and perform forensic analysis of macOS operating system and application artifacts. Students gain hands-on experience scripting and using automated tools to conduct a simulated live triage, and use multiple methods to acquire forensically sound images of Apple Macintosh computers. Topics include how the macOS default file system stores data, what happens when files are sent to the macOS Trash, where operating system and application artifacts are stored, and how they can be analyzed. Forensic artifacts covered include password recovery, recently opened files and applications, encryption handling, Mail, Safari, Messages, FaceTime, Photos, Chrome, and Firefox.

CI240 Intermediate Cyber Investigations: Virtual Currency (March 30-31, 2021, Virtual)

This course provides students with the fundamental knowledge and skills they need to investigate crimes involving virtual currency. Instructors explain foundational concepts like the characteristics of money, virtual currency, and cryptocurrency. Blockchain technology, proof work, and proof of stake are covered, and students learn how industry-leading cryptocurrencies (Bitcoin, Ethereum, and Monero) work and how they differ from each other. Finally, students learn investigative techniques for tracking and documenting transactions and best practices for seizing and securing cryptocurrency.

Webinar - Wellness in Unprecedented Times: Living Life in a Virtual World

2020 brought an onslaught of new challenges in the criminal justice world. We are all living in unprecedented times and the importance of wellness cannot afford to be overlooked. This webinar will explore the real-life challenges of living in a virtual time and focus on how intentional wellness can positively affect everyday life.

Presented by:
Mike Drugan, Owner, Drugan and Associates LLC
Elizabeth Strong, Program Manager, Wellness and Mental Health Initiatives, NW3C

Webinar - The Critical Role of a Money Laundering Professional

Money laundering is an integral part of many, if not most, of crime and terror finance. From local crime to tax avoidance to transnational networks, the source of money will be masked to conceal the source and at the same time serve to make the money usable in the legitimate worlds of business and finance. This requires the professionals involved to exercise expertise, business acumen, and power influence. This course will describe the types of money laundering professionals and how they serve to bridge the hidden and illicit sources of money with the real world, often remaining invisible themselves. We will use case studies to demonstrate the levels at which they operate (local, national/transnational, political) and the challenges they face in accomplishing their criminal goals.

Webinar - Shot in the Dark: A Cold Case Homicide in the Digital Age

Just a mile away from the Pottawattamie County Sheriff's Office in Council Bluffs, Iowa, a woman is shot during a nighttime stroll in a public park. It's the latest in a bizarre series of events, three years into a five-year missing persons investigation. Closing the case will take years of work, dozens of search warrants, and two weeks of testimony. This presentation will provide a case study of the investigation and prosecution of a no-body homicide. Getting to the verdict took thousands of hours of digital forensics to help prove premeditation and tie the killer, who hid themselves using VPNs and proxies, to years of online impersonations of their victim.

CI101 Basic Cyber Investigations: Digital Footprints (Feb. 18, 2021, Virtual)

This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individual’s digital footprint, protecting privacy on social media, and the consequences of oversharing personal information, as well as steps to take after becoming a target of doxing.

DF205 Intermediate Digital Forensic Analysis: SQLite Primer (Feb. 25, 2021, Virtual)

Mobile devices dominate the intake list and the desks of most digital forensics analysts globally. Devices are becoming more secure, with an increase in security; the need for detailed analysis is increasing as well. SQLite is a self-contained, serverless database engine. It is found on nearly every operating system and dominates iOS, Android, and macOS as one of the most prevalent and relevant data storage mechanisms. Rather than hope our forensic tools support the newest applications or be tethered to how a certain utility parses data, we can arm ourselves with the skills and techniques needed to conquer the analysis of nearly any application.

CI103 Basic Cyber Investigations: Advertising Identifiers (Feb. 2, 2021, Virtual)

This one-day course, focused on device location information, is for law enforcement investigators and analysts. Class concepts include device identifiers (IDs) in general, advertising IDs in detail, important legal considerations, overall investigative process, and tools available to law enforcement. Students will use commercially available investigative tools for querying databases of Advertising IDs and displaying their recorded broadcast locations.

Pages