Training Delivery - Classroom Training / Onsite

NW3C-FC 122 - Intellectual Property Theft Training (Apr 2018)

From baby formula to auto parts, criminals counterfeit all kinds of products. This one-day training is a real “eye-opener” for investigators and prosecutors on the potential dangers and economic repercussions of counterfeit products.

In response to the serious threat of counterfeit products and other types of intellectual property (IP) crime, the National White Collar Crime Center (NW3C) and the National Association of Attorneys General are providing training to state and local law enforcement in the area of IP crime.

NW3C-FC 122 - Intellectual Property Theft Training (Mar 2018)

From baby formula to auto parts–criminals counterfeit all kinds of products. This one-day training is a real “eye-opener” for investigators and prosecutors about the potential dangers and economic repercussions of counterfeit products.
In response to the serious threat of counterfeit products and other types of intellectual property (IP) crime, NW3C and the National Association of Attorneys General (NAAG) are providing training to state and local law enforcement in the area of IP crime.

During the training, students are provided with a state-specific workbook that includes statutes that may be applied to IP crimes, sample organizational documents for IP investigations, and other useful resources for IP investigations and prosecutions. Attendees are also provided with two resource CDs: one for law enforcement and one that can be used for the general public. These CDs contain resources to assist investigators and prosecutors with their IP crime cases.

The training is a mix of lecture, discussion and interactive exercises which includes:

Health and safety issues resulting from counterfeit products
Economic ramifications of IP crime
Investigative techniques and prosecutorial theories
IP crime connection to organized crime, gangs and terrorism
Hands-on exercise, "real" examples of counterfeit products, and more

Law Enforcement Suicide Prevention Training of Trainers (Apr 17 2018)

This eight-hour "Law Enforcement Suicide Prevention Training of Trainers" training will heighten awareness and help officers understand the indicators, the issues involved, potential solutions, and important protocols to consider. It will also provide materials for ongoing in-service and roll call training within the agency.

Law Enforcement Suicide Prevention Training of Trainers (Apr 4 2018)

This eight-hour "Law Enforcement Suicide Prevention Training of Trainers" training will heighten awareness and help officers understand the indicators, the issues involved, potential solutions, and important protocols to consider. It will also provide materials for ongoing in-service and roll call training within the agency.

Law Enforcement Suicide Prevention Training of Trainers (Mar 2018)

This eight-hour "Law Enforcement Suicide Prevention Training of Trainers" training will heighten awareness and help officers understand the indicators, the issues involved, potential solutions, and important protocols to consider. It will also provide materials for ongoing in-service and roll call training within the agency.

Law Enforcement Suicide Prevention Training of Trainers (Feb 22 2018)

This eight-hour "Law Enforcement Suicide Prevention Training of Trainers" training will heighten awareness and help officers understand the indicators, the issues involved, potential solutions, and important protocols to consider. It will also provide materials for ongoing in-service and roll call training within the agency.

Cyber Security 235 Basic Network Intrusion Investigations (Mar 2018)

This course covers the skills and techniques involved in responding to a network security incident. The course focuses on the identification, extraction, and detailed examination of artifacts associated with network and intrusions. Memory analysis, host machine forensics, network traffic and log analysis, malware analysis, and virtual machine sandboxing are covered through lecture, discussion, and hands-on exercises. Additional topics include key cybersecurity concepts and issues, as well as the various classifications and types of network attacks.

Cybercop 325 - Macintosh Forensic Analysis (Mar 2018)

The "Cybercop (CC) 325 - Macintosh Forensic Analysis" (MFA) course provides the fundamental knowledge and skills necessary to identify and collect volatile data, acquire forensically sound images of Apple Macintosh computers, and perform forensic analysis of macOS operating system and application artifacts. Students gain hands-on experience scripting and using automated tools to conduct a simulated live triage. Students will use multiple methods to acquire forensically sound images of Apple Macintosh computers and identify unique challenges that this task may present.

Cybercop 101 Basic Digital Forensic Imaging BDFI (Mar 2018)

This course covers the fundamentals of computer operations, hardware function, and configuration, as well as best practices for the protection, preservation, and imaging of digital evidence. Presentations and hands-on exercises cover topics such as partitioning, data storage, hardware and software write blockers, boot-up and shutdown processes, live imaging, encryption detection, and duplicate imaging. This course incorporates computer forensic applications that experienced practitioners are currently using in the field.

Course structure:

Cyber Investigation 101 Secure Techniques for Onsite Preview - STOP (Mar 7 2018)

The "Cyber Investigation (CI) 101 - Secure Techniques for Onsite Preview" course covers the usage and configuration of two tools (Paladin/Autopsy and osTriage) designed to preview a non-mobile digital device and export files of evidentiary value. DAY ONE is designed to preview a non-mobile digital device and export files of evidentiary value from a device that is powered on. DAY TWO is designed to preview a non-mobile digital device and export files of evidentiary value from a device that is powered off.

Pages