Training Delivery - Classroom Training/Onsite

IASAP Drug Abuse Detection: Shiprock, NM

Review the seven-step approach to drug influence and identification, which includes pulse, horizontal gaze nystagmus, vertical nystagmus, lack of convergence, pupillary comparison, pupil reaction, and Romberg stand. Gain understanding in how the eyes react to drug influence and the effects on the central nervous system. Practice what you have learned using hands-on activities. As a law enforcement or parole/probation officer, you will gain the skills you need to recognize impairment caused by the most abused drugs or alcohol in Indian Country.

IA 101 - Foundations of Intelligence Analysis Training (Aug 6 2018)

This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. This introductory course covers the history and purpose of intelligence analysis, the intelligence cycle, analytical thinking skills, and the importance of strategic analysis. The course was developed by a consortium that included the National White Collar Crime Center, Law Enforcement Intelligence Unit, the International Association of Law Enforcement Intelligence Analysis, and the Regional Information Sharing System.

NW3C-FC 122 - Intellectual Property Theft Training

From baby formula to auto parts, criminals counterfeit all kinds of products. This one-day training is a real “eye-opener” for investigators and prosecutors about the potential dangers and economic repercussions of counterfeit products. In response to the serious threat of counterfeit products and other types of intellectual property (IP) crime, the National White Collar Crime Center and the National Association of Attorneys General are providing training to state and local law enforcement in the area of IP crime.

NW3C-FC 122 - Intellectual Property Theft Training (Sept 2018)

From baby formula to auto parts, criminals counterfeit all kinds of products. This one-day training is a real “eye-opener” for investigators and prosecutors about the potential dangers and economic repercussions of counterfeit products. In response to the serious threat of counterfeit products and other types of intellectual property (IP) crime, the National White Collar Crime Center and the National Association of Attorneys General are providing training to state and local law enforcement in the area of IP crime.

CC 350 - Mobile Device Forensic Analysis (Sept 2018)

This course provides the fundamental knowledge and skills necessary to preserve, acquire, and analyze data on iOS devices (iPod Touch, iPhone, and iPad), as well as various Android devices. Students use forensically sound tools and techniques to acquire and analyze potential evidence. Topics include identifying potential threats to data stored on devices, available imaging options, accessing locked devices, and the default folder structure. The forensic artifacts covered include device information, call history, voicemail, messages, web browser history, contacts, and photos.

CC 201 - Digital Evidence Examination and Processing (Sept 2018)

This course builds on the concepts introduced in "Cybercop 101 - Basic Digital Forensic Imaging." It covers the architecture and functionality of the Windows NT File System, the FAT and the ExFAT File System, and related directory entry information for locating files on electronic devices. Topical areas include file headers and file hashing, recovery of deleted files and long file names, and techniques for discovering potential evidence that might otherwise be overlooked. This course incorporates an investigative scenario, providing hands-on experience with examination of hard drive images.

CC 101 - Basic Digital Forensic Imaging

This course covers the fundamentals of computer operations, hardware function, configuration, and best practices for the protection, preservation, and imaging of digital evidence. Presentations and hands-on exercises cover topics such as partitioning, data storage, hardware and software write blockers, the boot-up and shutdown processes, live imaging, encryption detection, and duplicate imaging. This course incorporates computer forensic applications that experienced practitioners are currently using in the field.

FC 105 - Financial Records Examination and Analysis

This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis and pattern recognition, and financial profiling. There is a strong focus on presenting financial evidence in multiple modalities: spreadsheet data outputs, graphic representations, and written/oral presentations.

Pages