Training Delivery - Classroom Training/Onsite

Protecting the Protectors: Maximizing Officer Safety During Traffic Safety Operation - NLERSP IACP Impaired Driving and Traffic Safety Conference 2022

In 2021, law enforcement experienced a 10-year high in fatalities from crashes and struck-by incidents (NLEOMF, 2022). Conducting traffic safety operations is a dangerous ordeal, but actions can be taken to reduce risk. This workshop will identify the major risk factors for collisions and struck-by incidents and discuss how officers can improve their safety while working in and around the roadways.

NLERSP Executive Course (In-Person, Abbreviated) - Georgia Chiefs of Police Summer Training Conference

Abbreviated NLERSP Executive Workshop provided as part of the Georgia Chiefs of Police Summer Training Conference. Lead your agency in roadway safety. Attend this 2-hour workshop with other mid-level and executive-level officers where you will discuss policies, training, and technological innovations that can reduce the risk of officer-involved collisions and struck-by incidents.

GACP STC Conference Attendee Training Early Reg. on/before 6/21/22 (General Membership) [Price for entire conference]

NLERSP Executive Course (In-Person, Abbreviated) - Georgia Chiefs of Police Summer Training Conference

Abbreviated NLERSP Executive Workshop provided as part of the Georgia Chiefs of Police Summer Training Conference. Lead your agency in roadway safety. Attend this 2-hour workshop with other mid-level and executive-level officers where you will discuss policies, training, and technological innovations that can reduce the risk of officer-involved collisions and struck-by incidents.

DF201 Intermediate Digital Forensic Analysis: Automated Forensic Tools

This course provides students with the fundamental knowledge and skills necessary to perform a limited digital forensic examination, validate hardware and software tools, and effectively use digital forensic suites and specialized tools. The course begins with a detailed study of the digital forensic examination process, including documentation, case management, evidence handling, validation, and virtualization. Students learn to use todays leading commercial and open source digital forensic suites: Magnet Axiom, X-ways Forensic, and Autopsy. Instruction on each suite will include an interface overview, configuration, hashing, file signature analysis, keyword searching, data carving, bookmarking, and report creation.

*Digital forensic process. Evidence review; requests for examination; case management.
*Validation. Creation of validation images; validation testing.
*Effective tool usage. Tool interface; hashing; file signature analysis; data carving; searching; metadata; bookmarking.
*Reporting. General report structure; report templates; using tool-generated reports.

DF330 Advanced Digital Forensic Analysis: iOS & Android

This course provides the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically-sound tools and techniques to analyze potential evidence, employing advanced techniques to uncover evidence potentially missed or misrepresented by commercial forensic tools. Topics include identifying potential threats to data stored on devices, available acquisition options, accessing locked devices, and the default folder structure. Core skills include analyzing artifacts such as device information, call history, voicemail, messages, web browser history, contacts, and photos. Instruction is provided on developing the hunt methodology for analyzing third party applications not supported by commercial forensic tools.

Mobile device hardware fundamentals. How mobile devices work, store data, and interact with a variety of networks.
Device handling. Properly preserving data for imaging and analysis. Identifying potential threats to data integrity.
Device acquisition and security. Acquisition options (physical, logical, device backups). Bypassing passcodes and properly defeating encrypted backups of iOS devices.
Advanced analysis techniques. Mounting images, partitioning scheme and default folder structure, types of artifacts (plists, SQLite databases, etc.).

DF310 Advanced Digital Forensic Analysis: Windows

This course covers the identification and extraction of artifacts associated with the Microsoft Windows operating system. Topics include the Change Journal, BitLocker, and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs, Volume Shadow Copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

Casting the Digital Footprint

Technology impacts almost every type of investigation today. Uncover the information technology users knowingly and unknowingly leave behind when accessing and using electronic devices. Learn how to covertly strengthen your investigations through gathering personal, public, and open source data. Discuss techniques to locate evidence through technologies that can benefit any type of investigation. 

Casting the Digital Footprint

Technology impacts almost every type of investigation today. Uncover the information technology users knowingly and unknowingly leave behind when accessing and using electronic devices. Learn how to covertly strengthen your investigations through gathering personal, public, and open source data. Discuss techniques to locate evidence through technologies that can benefit any type of investigation.

Training: Mid-Level Leadership Workshop: Fostering an Organizational Culture of Safety and Wellness

This VALOR workshop inspires mid-level law enforcement leaders to advance officer safety and wellness strategies within their own agencies.

This one-day workshop is a subject expert-facilitated event that:

  • Addresses leadership strategies.
  • Examines causes of officer assaults, injuries, and deaths.
  • Explores critical officer wellness issues.
  • Discusses protocols and best practices.
  • Discusses setting a safety precedent and accountability.
  • Illustrates actionable opportunities to increase safety and wellness.

 

CI102 Basic Cyber Investigations: Dark Web & Open Source Intelligence (Aug. 2020, Minnesota)

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites.

Pages