Training Delivery - Online Training

Catch Her If You Can: Today’s Pink Collar Criminal

Attend "Catch Her If You Can:Today's Pink Collar Criminal" and learn:

  • What is the difference between white collar crime and pink collar crime? 
  • Why is pink collar crime growing? 
  • Who is the “typical” pink collar criminal? 
  • How to identify “pink flags.” 
  • Tips and tricks for investigating and interviewing a pink collar criminal.

Presented by: Kelly Paxton Principal, K Paxton, LLC.

Introduction to Cell Phone Call/Communication Detail Records

This presentation will provide an overview of cell phone call/communication detail records (CDRs) and will focus on historical records available from primary cell phone companies, including logs of phone calls, short message service text messages, and Internet activity. The overview will also provide a brief introduction to cell phone-created CDRs, which may be available from non-cell phone sources such as email providers, smart phone application providers, and non-cellular-based Internet service providers.

Webinar: Implementing Evidence Based Practices and Services with Fidelity

Although crime control policy and program development processes are increasingly being informed by scientific evidence, identifying and adopting what works is only part of what’s needed to realize positive outcomes. Evidence-based programs and practices (EBPs) still have to be implemented with fidelity and integrity in order to be successful. Unfortunately, implementation is not an easy task. Implementation science, however, can help practitioners tackle implementation challenges so the promise of EBPs can be more fully realized.

NW3C FC 141 - Human Trafficking Awareness for Law Enforcement Officers (Feb 2018)

"Human Trafficking Awareness for Law Enforcement Officers" is an interactive e-learning course designed to provide law enforcement officers with an overview of human trafficking. Completing this course will contribute to the student’s understanding of the various elements involved in human trafficking.

NW3C-FC-115 Introduction to Mortgage Fraud (MORF) (Feb 2018)

The "Introduction to Mortgage Fraud" web-based course (MORF-WB) presents awareness-level information on mortgage fraud. The course covers basic definitions and terminology, common types of mortgage fraud schemes, components of fraud, roles in the mortgage process, and legal explanations. Students will also learn to recognize fraud indicators associated with a variety of schemes and opportunities to commit fraud throughout the mortgage process. A sample mortgage loan application and other forms used in the process are available to download within this course.

NW3C-FC-115 Introduction to Mortgage Fraud (MORF)

The "Introduction to Mortgage Fraud" (MORF) course presents awareness-level information on mortgage fraud. The course covers basic definitions and terminology, common types of mortgage fraud schemes, components of fraud, roles in the mortgage process, and legal explanations. Students will also learn to recognize fraud indicators associated with a variety of schemes and opportunities to commit fraud throughout the mortgage process. A sample mortgage loan application and other forms used in the process are available to download within this course.

Course structure:

NW3C FC 141 - Human Trafficking Awareness for Law Enforcement Officers (Jan 2018)

"Human Trafficking Awareness for Law Enforcement Officers" is an interactive e-learning course designed to provide law enforcement officers with an overview of human trafficking. Completing this course will contribute to the student’s understanding of the various elements involved in human trafficking.

Cyber Investigation 091 Introduction to Previewing ITP-WB (Dec 2017)

This interactive, online module provides an overview of the basic concepts behind secure previewing of digital devices. Students will become familiar with both onsite and offsite secure previewing and learn to identify the two states in which a preview can be conducted (i.e., live-box and dead-box previewing). At the completion of the course, students will be able to recognize the recommended collection order of volatile data (the "order of volatility").

Pages