Training Delivery - Classroom Training / Onsite

Casting the Digital Footprint

Technology impacts almost every type of investigation today. Uncover the information technology users knowingly and unknowingly leave behind when accessing and using electronic devices. Learn how to covertly strengthen your investigations through gathering personal, public, and open source data. Discuss techniques to locate evidence through technologies that can benefit any type of investigation. 

Casting the Digital Footprint

Technology impacts almost every type of investigation today. Uncover the information technology users knowingly and unknowingly leave behind when accessing and using electronic devices. Learn how to covertly strengthen your investigations through gathering personal, public, and open source data. Discuss techniques to locate evidence through technologies that can benefit any type of investigation.

Training: Mid-Level Leadership Workshop: Fostering an Organizational Culture of Safety and Wellness

This VALOR workshop inspires mid-level law enforcement leaders to advance officer safety and wellness strategies within their own agencies.

This one-day workshop is a subject expert-facilitated event that:

  • Addresses leadership strategies.
  • Examines causes of officer assaults, injuries, and deaths.
  • Explores critical officer wellness issues.
  • Discusses protocols and best practices.
  • Discusses setting a safety precedent and accountability.
  • Illustrates actionable opportunities to increase safety and wellness.

 

CI130 Basic Cyber Investigations: Cellular Records Analysis (Aug. 2020, New Jersey)

This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers, and how to plot cellular site locations to determine the approximate position of a suspect during a given period. No special hardware or software is required. However, this course focuses heavily on analysis; as such, a strong working knowledge of Microsoft Excel is highly recommended. Students are provided with a free copy of the National White Collar Crime Center's (NW3C) PerpHound tool, which assists in the plotting of call detail record locations.

DF201 Intermediate Digital Forensic Analysis: Automated Forensic Tools (Aug. 2020, Oklahoma)

This course provides students with the fundamental knowledge and skills necessary to perform a limited digital forensic examination, validate hardware and software tools, and effectively use digital forensic suites and specialized tools. The course begins with a detailed review of the digital forensic examination process, including documentation, case management, evidence handling, validation, and virtualization. Students learn to use today's leading commercial and open source digital forensic suites: Magnet Axiom, X-ways Forensic, and Autopsy. Instruction on each suite will include an interface overview, configuration, hashing, file signature analysis, keyword searching, data carving, bookmarking, and report creation.

DF330 Advanced Digital Forensic Analysis: iOS & Android (Aug. 2020, Ohio)

This course provides the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically sound tools and techniques to analyze potential evidence, employing advanced techniques to uncover evidence potentially missed or misrepresented by commercial forensic tools. Topics include identifying potential threats to data stored on devices, using available acquisition options, accessing locked devices, and understanding the default folder structure. Core skills include analyzing artifacts such as device information, call history, voicemail, messages, web browser history, contacts, and photos. Instruction is provided on developing the "hunt" methodology for analyzing third-party applications not supported by commercial forensic tools.

CI101 Basic Cyber Investigations: Digital Footprints (Aug. 2020, Tennessee)

This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individual’s digital footprint, protecting privacy on social media, and the consequences of oversharing personal information, as well as steps to take after becoming a target of doxing.

FC102 Financial Investigations Triage (Aug. 26, 2020, Missouri)

This course provides an overview of the actions investigators can take at the outset of a financial crime investigation. Students learn to ask critical questions, gather documentation, and analyze information for leads. Topics include obtaining and working with financial records, red flags in financial cases, money laundering, investigative strategies for different types of financial crimes, and commingled funds.

FC102 Financial Investigations Triage (Aug. 27, 2020, Missouri)

This course provides an overview of the actions investigators can take at the outset of a financial crime investigation. Students learn to ask critical questions, gather documentation, and analyze information for leads. Topics include obtaining and working with financial records, red flags in financial cases, money laundering, investigative strategies for different types of financial crimes, and commingled funds.

Pages