Training Delivery - Classroom Training/Onsite

CI 100 - Identifying and Seizing Electronic Evidence (Mar 2019)

This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve electronic evidence at a crime scene. Topics include recognizing potential sources of electronic evidence; planning and executing a digital evidence-based seizure; and the preservation, packaging, documentation, and transfer of digital evidence.

PT201 Digital Evidence Basics & the CLOUD Act (Jun 25 2019, North Carolina)

This course provides the technical and legal information prosecutors need to see cases involving digital evidence through the entire criminal justice process, from seizure and extraction to admissibility to verdict. Topics include digital evidence commonly seized during the execution of a search warrant, digital evidence stored remotely by third-party service providers, and the processes investigators use to obtain this evidence (such as the interrogation of digital devices). There is a strong focus on case law and other legal issues surrounding the collection and custody of digital evidence, as well as its use at trial. The course also examines new legislation like the CLOUD Act, which is reforming the digital evidence landscape just as rapidly as the ever-changing case law.

PT201 Digital Evidence Basics & the CLOUD Act (Jun 27 2019, North Carolina)

This course provides the technical and legal information prosecutors need to see cases involving digital evidence through the entire criminal justice process, from seizure and extraction to admissibility to verdict. Topics include digital evidence commonly seized during the execution of a search warrant, digital evidence stored remotely by third-party service providers, and the processes investigators use to obtain this evidence (such as the interrogation of digital devices). There is a strong focus on case law and other legal issues surrounding the collection and custody of digital evidence, as well as its use at trial. The course also examines new legislation like the CLOUD Act, which is reforming the digital evidence landscape just as rapidly as the ever-changing case law.

CenTF Multijurisdictional Task Force Commanders Training (July 2019)

The Bureau of Justice Assistance’s Center for Task Force Training (CenTF) Program offers the classroom-based “Task Force Commanders Training” through a two-day onsite training. This training covers a variety of topics designed to assist task force commanders and other law enforcement leaders in making appropriate decisions regarding task force administration and operations planning and management.

CenTF Multijurisdictional Task Force Commanders Training (April 2019)

The Bureau of Justice Assistance’s Center for Task Force Training (CenTF) Program offers the classroom-based “Task Force Commanders Training” through a two-day onsite training. This training covers a variety of topics designed to assist task force commanders and other law enforcement leaders in making appropriate decisions regarding task force administration and operations planning and management.

CenTF Multijurisdictional Task Force Commanders Training (March 2019)

The Bureau of Justice Assistance’s Center for Task Force Training (CenTF) Program offers the classroom-based “Task Force Commanders Training” through a two-day onsite training. This training covers a variety of topics designed to assist task force commanders and other law enforcement leaders in making appropriate decisions regarding task force administration and operations planning and management.

DF201 Intermediate Digital Forensic Analysis: Automated Forensic Tools (Jun 2019, Georgia)

This course provides students with the fundamental knowledge and skills necessary to perform a limited digital forensic examination, validate hardware and software tools, and effectively use digital forensic suites and specialized tools. The course begins with a detailed review of the digital forensic examination process, including documentation, case management, evidence handling, validation, and virtualization. Students learn to use today's leading commercial and open source digital forensic suites: Magnet Axiom, X-ways Forensic, and Autopsy. Instruction on each suite will include an interface overview, configuration, hashing, file signature analysis, keyword searching, data carving, bookmarking, and report creation. 

FC105 Financial Records Examination and Analysis (Jun 2019, Kentucky)

This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis and pattern recognition, and financial profiling. There is a strong focus on presenting financial evidence in multiple modalities: spreadsheet data outputs, graphic representations, and written/oral presentations.

CI102 Basic Cyber Investigations: Dark Web & Open Source Intelligence (Jun 2019, Illinois)

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites. 

CI240 Intermediate Cyber Investigations: Virtual Currency (Jun 2019, Colorado)

This course provides students with the fundamental knowledge and skills they need to investigate crimes involving virtual currency. Instructors explain foundational concepts like the characteristics of money, virtual currency, and cryptocurrency. Blockchain technology, proof work, and proof of stake are covered, and students learn how industry-leading cryptocurrencies (Bitcoin, Ethereum, and Monero) work and how they differ from each other. Finally, students learn investigative techniques for tracking and documenting transactions and best practices for seizing and securing cryptocurrency.

Pages