Training Delivery - Classroom Training/Onsite

CI240 Intermediate Cyber Investigations: Virtual Currency

This course provides students with the fundamental knowledge and skills they need to investigate crimes involving virtual currency. Instructors explain foundational concepts like the characteristics of money, virtual currency, and cryptocurrency. Blockchain technology, proof work, and proof of stake are covered; and students learn how industry-leading cryptocurrencies (Bitcoin, Ethereum, and Monero) work and how they differ from each other. Finally, students learn investigative techniques for tracking and documenting transactions; and best practices for seizing and securing cryptocurrency.

*Virtual currency basics. History of money and of virtual currency. Categorizing virtual currency.
*Blockchain. History of the blockchain. Understanding different protocols.
*Cryptocurrencies in detail. Bitcoin, Ethereum, Monero and other privacy coins.
*Investigative techniques. Seizing virtual currency; tracking transactions through the blockchain; documenting investigative results.

The Role of Online Social Media in Predicting and Interdicting Spree Killings: Case Studies and Analysis

Online social media and emerging methods of electronic communication are changing how people communicate and interact with world around them. Increasingly, those contemplating engaging acts of spree violence express themselves in online social media. It is important that investigators, analysts, and those responsible for school, workplace, and public safety understand how this behavior plays a key role in predicting and interdicting the violence. Items of evidentiary value can now often be recovered from online communities. This evidence can provide indicators of planned violence and help to shed light on the thought processes and motivations that led to the tipping point of violence.
The training will explore the interaction between social media and spree violence through a historical examination of case studies ranging in time from 1927 to 2022. Police, prosecutors, probation officers, school and university administrators, and others responsible for workplace and public safety can all benefit from this training.

Protecting the Protectors: Maximizing Officer Safety During Traffic Safety Operation - NLERSP IACP Impaired Driving and Traffic Safety Conference 2022

In 2021, law enforcement experienced a 10-year high in fatalities from crashes and struck-by incidents (NLEOMF, 2022). Conducting traffic safety operations is a dangerous ordeal, but actions can be taken to reduce risk. This workshop will identify the major risk factors for collisions and struck-by incidents and discuss how officers can improve their safety while working in and around the roadways.

NLERSP Executive Course (In-Person, Abbreviated) - Georgia Chiefs of Police Summer Training Conference

Abbreviated NLERSP Executive Workshop provided as part of the Georgia Chiefs of Police Summer Training Conference. Lead your agency in roadway safety. Attend this 2-hour workshop with other mid-level and executive-level officers where you will discuss policies, training, and technological innovations that can reduce the risk of officer-involved collisions and struck-by incidents.

NLERSP Executive Course (In-Person, Abbreviated) - Georgia Chiefs of Police Summer Training Conference

Abbreviated NLERSP Executive Workshop provided as part of the Georgia Chiefs of Police Summer Training Conference. Lead your agency in roadway safety. Attend this 2-hour workshop with other mid-level and executive-level officers where you will discuss policies, training, and technological innovations that can reduce the risk of officer-involved collisions and struck-by incidents.

DF201 Intermediate Digital Forensic Analysis: Automated Forensic Tools

This course provides students with the fundamental knowledge and skills necessary to perform a limited digital forensic examination, validate hardware and software tools, and effectively use digital forensic suites and specialized tools. The course begins with a detailed study of the digital forensic examination process, including documentation, case management, evidence handling, validation, and virtualization. Students learn to use today's leading commercial and open source digital forensic suites: Magnet Axiom, X-ways Forensic, and Autopsy. Instruction on each suite will include an interface overview, configuration, hashing, file signature analysis, keyword searching, data carving, bookmarking, and report creation.

*Digital forensic process. Evidence review; requests for examination; case management.
*Validation. Creation of validation images; validation testing.
*Effective tool usage. Tool interface; hashing; file signature analysis; data carving; searching; metadata; bookmarking.
*Reporting. General report structure; report templates; using tool-generated reports.

DF310 Advanced Digital Forensic Analysis: Windows

This course covers the identification and extraction of artifacts associated with the Microsoft Windows operating system. Topics include the Change Journal, BitLocker, and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs, Volume Shadow Copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

Casting the Digital Footprint

Technology impacts almost every type of investigation today. Uncover the information technology users knowingly and unknowingly leave behind when accessing and using electronic devices. Learn how to covertly strengthen your investigations through gathering personal, public, and open source data. Discuss techniques to locate evidence through technologies that can benefit any type of investigation. 

Casting the Digital Footprint

Technology impacts almost every type of investigation today. Uncover the information technology users knowingly and unknowingly leave behind when accessing and using electronic devices. Learn how to covertly strengthen your investigations through gathering personal, public, and open source data. Discuss techniques to locate evidence through technologies that can benefit any type of investigation.

Training: Mid-Level Leadership Workshop: Fostering an Organizational Culture of Safety and Wellness

This VALOR workshop inspires mid-level law enforcement leaders to advance officer safety and wellness strategies within their own agencies.

This one-day workshop is a subject expert-facilitated event that:

  • Addresses leadership strategies.
  • Examines causes of officer assaults, injuries, and deaths.
  • Explores critical officer wellness issues.
  • Discusses protocols and best practices.
  • Discusses setting a safety precedent and accountability.
  • Illustrates actionable opportunities to increase safety and wellness.

 

Pages