Training Delivery - Classroom Training/Onsite

PT201 Digital Evidence Basics & the CLOUD Act (May 2019, Massachusetts)

This course provides the technical and legal information prosecutors need to see cases involving digital evidence through the entire criminal justice process, from seizure and extraction to admissibility to verdict. Topics include digital evidence commonly seized during the execution of a search warrant, digital evidence stored remotely by third-party service providers, and the processes investigators use to obtain this evidence (such as the interrogation of digital devices). There is a strong focus on case law and other legal issues surrounding the collection and custody of digital evidence, as well as its use at trial. The course also examines new legislation like the CLOUD Act, which is reforming the digital evidence landscape just as rapidly as the ever-changing case law.

DF320 Advanced Digital Forensic Analysis: macOS (Jun 2019, Arkansas)

This course teaches students to identify and collect volatile data, acquire forensically sound images of Apple Macintosh computers, and perform forensic analysis of macOS operating system and application artifacts. Students gain hands-on experience scripting and using automated tools to conduct a simulated live triage, and use multiple methods to acquire forensically sound images of Apple Macintosh computers. Topics include how the macOS default file system stores data, what happens when files are sent to the macOS Trash, where operating system and application artifacts are stored, and how they can be analyzed. Forensic artifacts covered include password recovery, recently opened files and applications, encryption handling, Mail, Safari, Messages, FaceTime, Photos, Chrome, and Firefox.

Survive & Thrive Fundamentals: Protecting You and Your Fellow Officers

This VALOR Officer Safety and Wellness Program training, offered as a one-day course, provides officers at all levels with exactly that — the essentials to survive and thrive — by stressing the importance of being physically and mentally prepared, maintaining situational awareness, combating complacency, and remaining vigilant. Participants will hear from law enforcement experts on:

Internet Intelligence Training: Social Media Exploitation (June 2019)

This course offers a comprehensive program for internet investigations and open-source intelligence gathering. Students learn how to enhance their search skills to effectively use internet resources for locating information online.

Cognitive Interviewing, Communication & Influence (Jul 2019)

This course introduces the art of cognitive interviewing using neuro-linguistic programming techniques. Students learn how to interview suspects, witnesses, and victims more effectively, as well as to observe brain-based deception behavior in both face-to-face and virtual communications. Topics include influence and persuasion with difficult witnesses and suspects, interpretation of body language for deceit and truthfulness, and best practices for testimony and reframing cross-examination.

Cognitive Interviewing, Communication & Influence (Apr 2019)

This course introduces the art of cognitive interviewing using neuro-linguistic programming techniques. Students learn how to interview suspects, witnesses, and victims more effectively, as well as to observe brain-based deception behavior in both face-to-face and virtual communications. Topics include influence and persuasion with difficult witnesses and suspects, interpretation of body language for deceit and truthfulness, and best practices for testimony and reframing cross-examination.

DF201 Intermediate Digital Forensic Analysis: Automated Forensic Tools (May 2019, Florida)

This course provides students with the fundamental knowledge and skills necessary to perform a limited digital forensic examination, validate hardware and software tools, and effectively use digital forensic suites and specialized tools. The course begins with a detailed review of the digital forensic examination process, including documentation, case management, evidence handling, validation, and virtualization. Students learn to use today's leading commercial and open source digital forensic suites: Magnet Axiom, X-ways Forensic, and Autopsy. Instruction on each suite will include an interface overview, configuration, hashing, file signature analysis, keyword searching, data carving, bookmarking, and report creation. 

DF310 Advanced Digital Forensic Analysis: Windows (May 2019, Iowa)

This course covers the identification and extraction of artifacts associated with the Microsoft Windows operating system. Topics include the Change Journal, BitLocker, and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs, Volume Shadow Copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

CI102 Basic Cyber Investigations: Dark Web & Open Source Intelligence (May 2019, New York)

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites. 

FC105 Financial Records Examination and Analysis (May 2019, Texas)

This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis and pattern recognition, and financial profiling. There is a strong focus on presenting financial evidence in multiple modalities: spreadsheet data outputs, graphic representations, and written/oral presentations.

Pages