Training Delivery - Classroom Training / Onsite

FC122 Intellectual Property Theft Training (Apr 2019, Kentucky)

This course introduces the problem of intellectual property (IP) theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific workbook that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

CI 100 - Identifying and Seizing Electronic Evidence (Mar 2019)

This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve electronic evidence at a crime scene. Topics include recognizing potential sources of electronic evidence; planning and executing a digital evidence-based seizure; and the preservation, packaging, documentation, and transfer of digital evidence.

PT201 Digital Evidence Basics & the CLOUD Act (Jun 25 2019, North Carolina)

This course provides the technical and legal information prosecutors need to see cases involving digital evidence through the entire criminal justice process, from seizure and extraction to admissibility to verdict. Topics include digital evidence commonly seized during the execution of a search warrant, digital evidence stored remotely by third-party service providers, and the processes investigators use to obtain this evidence (such as the interrogation of digital devices). There is a strong focus on case law and other legal issues surrounding the collection and custody of digital evidence, as well as its use at trial. The course also examines new legislation like the CLOUD Act, which is reforming the digital evidence landscape just as rapidly as the ever-changing case law.

PT201 Digital Evidence Basics & the CLOUD Act (Jun 27 2019, North Carolina)

This course provides the technical and legal information prosecutors need to see cases involving digital evidence through the entire criminal justice process, from seizure and extraction to admissibility to verdict. Topics include digital evidence commonly seized during the execution of a search warrant, digital evidence stored remotely by third-party service providers, and the processes investigators use to obtain this evidence (such as the interrogation of digital devices). There is a strong focus on case law and other legal issues surrounding the collection and custody of digital evidence, as well as its use at trial. The course also examines new legislation like the CLOUD Act, which is reforming the digital evidence landscape just as rapidly as the ever-changing case law.

CenTF Multijurisdictional Task Force Commanders Training (July 2019)

The Bureau of Justice Assistance’s Center for Task Force Training (CenTF) Program offers the classroom-based “Task Force Commanders Training” through a two-day onsite training. This training covers a variety of topics designed to assist task force commanders and other law enforcement leaders in making appropriate decisions regarding task force administration and operations planning and management.

CenTF Multijurisdictional Task Force Commanders Training (April 2019)

The Bureau of Justice Assistance’s Center for Task Force Training (CenTF) Program offers the classroom-based “Task Force Commanders Training” through a two-day onsite training. This training covers a variety of topics designed to assist task force commanders and other law enforcement leaders in making appropriate decisions regarding task force administration and operations planning and management.

CenTF Multijurisdictional Task Force Commanders Training (March 2019)

The Bureau of Justice Assistance’s Center for Task Force Training (CenTF) Program offers the classroom-based “Task Force Commanders Training” through a two-day onsite training. This training covers a variety of topics designed to assist task force commanders and other law enforcement leaders in making appropriate decisions regarding task force administration and operations planning and management.

FC105 Financial Records Examination and Analysis (Jun 2019, Kentucky)

This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis and pattern recognition, and financial profiling. There is a strong focus on presenting financial evidence in multiple modalities: spreadsheet data outputs, graphic representations, and written/oral presentations.

CI102 Basic Cyber Investigations: Dark Web & Open Source Intelligence (Jun 2019, Illinois)

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites. 

CI240 Intermediate Cyber Investigations: Virtual Currency (Jun 2019, Colorado)

This course provides students with the fundamental knowledge and skills they need to investigate crimes involving virtual currency. Instructors explain foundational concepts like the characteristics of money, virtual currency, and cryptocurrency. Blockchain technology, proof work, and proof of stake are covered, and students learn how industry-leading cryptocurrencies (Bitcoin, Ethereum, and Monero) work and how they differ from each other. Finally, students learn investigative techniques for tracking and documenting transactions and best practices for seizing and securing cryptocurrency.

Pages