Training Delivery - Classroom Training / Onsite

Law Enforcement Suicide Prevention Training of Trainers (Jan 2018)

This training will heighten awareness of suicide prevention within the law enforcement profession, helping participants to understand the indicators, the issues involved, potential solutions, and important protocols to consider. It will also provide materials for ongoing in-service and roll call training within the agency. This training is designed for law enforcement trainers who wish to teach a block of instruction on suicide prevention and intervention techniques within a law enforcement setting.

Pharmaceutical Crime - Advanced Investigative Techniques (Feb 2018)

This course is for the detective who is assigned to a pharmaceutical crime unit or investigation. This course will address the crimes associated with pharmaceutical drug diversion, criminal methods, investigative techniques, evidence collection, and the importance of involving a prosecutor at the onset to prepare the case for successful prosecution.

Pharmaceutical Crime - Tools for the Street (Feb 2018)

This course is for the street patrol officers/new detectives who need to understand the scope of the problem, the types of crimes that may be encountered, how to respond to the scene, awareness of associated evidence, interview techniques, and documentation to further an investigation for a successful prosecution.

Pharmaceutical Crime - Tools for the Street (Jan 2018)

This course is for the street patrol officers/new detectives who need to understand the scope of the problem, the types of crimes that may be encountered, how to respond to the scene, awareness of associated evidence, interview techniques, and documentation to further an investigation for a successful prosecution.

Pharmaceutical Crime - Advanced Investigative Techniques (Jan 2018)

This course is for the detective who is assigned to a pharmaceutical crime unit or investigation. This course will address the crimes associated with pharmaceutical drug diversion, criminal methods, investigative techniques, evidence collection, and the importance of involving a prosecutor at the onset to prepare the case for successful prosecution.

Cybersecurity 235 - Basic Network Intrusion Investigations BNII (Sep 2017)

The "Cybersecurity (CS) 235 - Basic Network Intrustion Investigations" (BNII) course covers the skills and techniques involved in responding to a network security incident. The course focuses on the identification, extraction, and detailed examination of artifacts associated with network and intrusions. Memory analysis, host machine forensics, network traffic and log analysis, malware analysis, and virtual machine sandboxing are covered through lecture, discussion, and hands-on exercises.

Cybercop 350 Mobile Device Forensic Analysis (June 2018)

The "Cybercop (CC) 350 - Mobile Device Forensic Analysis" (MDFA) course provides the fundamental knowledge and skills necessary to preserve, acquire, and analyze data on iOS devices (iPod Touch, iPhone, and iPad), as well as various Android devices. Students use forensically sound tools and techniques to acquire and analyze potential evidence. Topics include identifying potential threats to data stored on devices, available imaging options, accessing locked devices, and the default folder structure.

Cybercop 250 Linux Open Source Forensics

The "Cybercop (CC) 250 Linux Open Source Forensics" course teaches students how to use free and open source software to conduct digital forensic examinations. Students learn to locate and install free Linux-based forensic software. After covering key forensic concepts as applied to open source software, basic forensic analysis techniques are covered.

Cybersecurity 235 - Basic Network Intrusion Investigations BNII (Feb - Mar 2018)

The "Cybersecurity (CS) 235 - Basic Network Intrusion Investigations" (BNII) course covers the skills and techniques involved in responding to a network security incident. The course focuses on the identification, extraction, and detailed examination of artifacts associated with network and intrusions. Memory analysis, host machine forensics, network traffic and log analysis, malware analysis, and virtual machine sandboxing are covered through lecture, discussion, and hands-on exercises.

Pages