Training Delivery - Classroom Training / Onsite

Telecommunications Best Practices for Missing and Abducted Children

The National Criminal Justice Training Center of Fox Valley Technical College is hosting a classroom training in Mayetta, Kansas on February 26, 2020 to share resources and best practices needed to support quick and critical responses to reports of missing, abducted, and sexually exploited children. This training is primarily for front-line telecommunications personnel, telecommunications supervisors and directors, and front-line law enforcement officers.

DF201 Intermediate Digital Forensic Analysis: Automated Forensic Tools (Feb. 2020, Connecticut)

This course provides students with the fundamental knowledge and skills necessary to perform a limited digital forensic examination, validate hardware and software tools, and effectively use digital forensic suites and specialized tools. The course begins with a detailed review of the digital forensic examination process, including documentation, case management, evidence handling, validation, and virtualization. Students learn to use today's leading commercial and open source digital forensic suites: Magnet Axiom, X-ways Forensic, and Autopsy. Instruction on each suite will include an interface overview, configuration, hashing, file signature analysis, keyword searching, data carving, bookmarking, and report creation.

CI102 Basic Cyber Investigations: Dark Web & Open Source Intelligence (Feb. 2020, Alabama)

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites.

DF330 Advanced Digital Forensic Analysis: iOS & Android (Feb. 2020, Georgia)

This course provides the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically sound tools and techniques to analyze potential evidence, employing advanced techniques to uncover evidence potentially missed or misrepresented by commercial forensic tools. Topics include identifying potential threats to data stored on devices, using available acquisition options, accessing locked devices, and understanding the default folder structure. Core skills include analyzing artifacts such as device information, call history, voicemail, messages, web browser history, contacts, and photos. Instruction is provided on developing the "hunt" methodology for analyzing third-party applications not supported by commercial forensic tools.

Effective Strategies to Investigate and Prosecute Labor Trafficking in the United States

This two-and-a-half-day training—funded by the Bureau of Justice Assistance and sponsored by the International Association of Chiefs of Police (IACP) and AEquitas—will educate participants on how to identify victims of labor trafficking, as well as share best practices for investigating and prosecuting labor trafficking crimes.

CI101 Basic Cyber Investigations: Digital Footprints (Jan. 2020, Pennsylvania)

This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individual’s digital footprint, protecting privacy on social media, and the consequences of oversharing personal information, as well as steps to take after becoming a target of doxing.

CI102 Basic Cyber Investigations: Dark Web & Open Source Intelligence (Feb. 2020, Pennsylvania)

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites.

CI101 Basic Cyber Investigations: Digital Footprints (January 2020, Pennsylvania)

This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individual’s digital footprint, protecting privacy on social media, and the consequences of oversharing personal information, as well as steps to take after becoming a target of doxing.

CI240 Intermediate Cyber Investigations: Virtual Currency (Feb. 2020, Pennsylvania)

This course provides students with the fundamental knowledge and skills they need to investigate crimes involving virtual currency. Instructors explain foundational concepts like the characteristics of money, virtual currency, and cryptocurrency. Blockchain technology, proof work, and proof of stake are covered, and students learn how industry-leading cryptocurrencies (Bitcoin, Ethereum, and Monero) work and how they differ from each other. Finally, students learn investigative techniques for tracking and documenting transactions and best practices for seizing and securing cryptocurrency.

Pages