This course provides hands-on investigative training at a basic level. Students develop the practical skills, insight, and knowledge necessary to manage a successful financial investigation from start to finish, including the acquisition and examination of financial records, interview skills,...
BJA NTTAC's online TTA Catalog is a feature for BJA TTA providers to market upcoming webinars, training opportunities, and technical assistance to the justice community based on their needs and locations. The BJA NTTAC team also shares conferences, trainings, and events from across the field that may be of interest to the justice community.
The “Training Catalog” tab lists webinars, training opportunities, and conferences, both upcoming and completed within the past year, while the “Event Calendar” displays these webinars, trainings, and conferences in a monthly calendar view. The “Upcoming Events” tab only displays upcoming webinars, training opportunities, and conferences. The “TTA Resources” tab displays technical assistance, defined as specialized guidance on a particular topic, tailored to a requesting agency; programs, defined as larger TTA programs offered by BJA TTA providers that have various offerings on a particular topic; and training. Lastly, the “BJA TTA Grantees” tab displays a list of current BJA TTA grantees.
This course prepares students to identify various artifacts typically located in property lists and SQLite databases on MacOS-based computers, as well as learn how to perform forensic analysis. Students gain hands-on practical experience writing basic SQL queries and using to analyze operating...
Mobile devices dominate the intake list, and the desks of most digital forensics analyst globally. Devices are becoming more secure, with an increase in security the need for detailed analysis is increasing as well. SQLite is a self-contained, serverless database engine. It is found on nearly...
This course prepares students to identify various artifacts typically located in property lists and SQLite databases on MacOS-based computers, as well as learn how to perform forensic analysis. Students gain hands-on practical experience writing basic SQL queries and using to analyze operating...
This course covers the identification and extraction of artifacts associated with the Microsoft Windows operating system. Topics include the Change Journal, BitLocker, and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs,...
This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. Topics include the intelligence cycle, analytical thinking skills, the importance of strategic analysis, communication and social media analysis, recommendation development...
This course provides students with information they need to collaboratively assist older victims of fraud perpetuated in multiple jurisdictions by phone or Internet. This course offers background information on transnational fraud and tips for identifying and interviewing older victims through a...
This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers; and how to plot cellular site locations...
This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations....
An effective financial investigation can disrupt terrorism organizations and interrupt, deter, or even stop operational terrorism activities before they can begin. In this three-day course, students develop an understanding of how financial systems are used to support terrorism activities and...
This course promotes a multi-agency approach to the problem of financial exploitation of senior citizens. Topics include working with senior victims, examining documents like bank records and power of attorney, and resources for investigation and community awareness. Detailed examination of a...
This course introduces the problem of intellectual property theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of...
Starting in January, Section 5121 requires Medicaid and the Children's Health Insurance Program (CHIP) to cover some services provided in correctional facilities to youth and young adults immediately before and after they are released.
These requirements were included as part of the...
Discover powerful resources to strengthen rural communities! Join the Rural Violent Crime Reduction Initiative (RVCRI) team on November 21, 2024, at 2:00 pm ET for a valuable webinar on available funding, training, and specialized support to help rural law enforcement agencies strengthen their...
Given the variety of behavioral challenges that can occur in a school environment, it is essential for school resource officers, security personnel, and school staff to possess strong de-escalation skills. These abilities are crucial for preventing situations from escalating and for responding...
Organized retail crime is on the rise, affecting both the retail and financial industries. In a landmark case titled Operation Bad Bot, Homeland Security Investigations (HSI) unraveled a complex, online gift card fraud scheme, culminating in the shutdown of a marketplace with more than $22...
This intermediate spreadsheeting course uses Microsoft Excel to assess and organize data in an electronic format. The class is designed for learners who have experience using Excel and who want to increase their spreadsheeting knowledge and skills. Topics include text functions, absolute...
This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis...
This webinar will cover investigations into Telegram app. For many, Telegram has been a frustration as they do not know how the app works, and just what investigative avenues can be pursued. This webinar will cover how Telegram functions, how Telegram channels work, how Telegram Bots work to...
This course addresses key objectives focused on training intelligence analysts working at or towards the intermediate-level (practitioner and/or experienced analyst). This course expands upon core analytic fundamentals covered in NW3C's FIAT, ISIA, and IWAB offerings. The course begins with an...
This course provides training on digital forensics for video, specifically targeting common file formats rather than proprietary video encodings or delivery methods. It aims to prepare investigators to answer critical questions about the file and ensure key evidence is not overlooked. This...
This course provides hands-on investigative training at a basic level. Students develop the practical skills, insight, and knowledge necessary to manage a successful financial investigation from start to finish, including the acquisition and examination of financial records, interview skills,...
This three-day course covers the fundamentals of financial investigations and incorporates some of the more advanced processes that elevate an investigation. During this course, students will learn about investigative processes, practical tools, and sources of information necessary to plan and...
Secondary trauma and victimization aka vicarious victimization isn’t foreign to prosecutors, advocates and staff members. Those feelings of stress, burn out, physical and emotional exhaustion, can and do happen, and often with what seems to be no warning. It’s time to tackle the reality of...
This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations....