This course provides hands-on investigative training at a basic level. Students develop the practical skills, insight, and knowledge necessary to manage a successful financial investigation from start to finish, including the acquisition and examination of financial records, interview skills,...
BJA NTTAC's online TTA Catalog is a feature for BJA TTA providers to market upcoming webinars, training opportunities, and technical assistance to the justice community based on their needs and locations. The BJA NTTAC team also shares conferences, trainings, and events from across the field that may be of interest to the justice community.
The “Training Catalog” tab lists webinars, training opportunities, and conferences, both upcoming and completed within the past year, while the “Event Calendar” displays these webinars, trainings, and conferences in a monthly calendar view. The “Upcoming Events” tab only displays upcoming webinars, training opportunities, and conferences. The “TTA Resources” tab displays technical assistance, defined as specialized guidance on a particular topic, tailored to a requesting agency; programs, defined as larger TTA programs offered by BJA TTA providers that have various offerings on a particular topic; and training. Lastly, the “BJA TTA Grantees” tab displays a list of current BJA TTA grantees.
COVID-19 Update: Training opportunities and events listed in the BJA NTTAC TTA Catalog may be directly impacted by COVID-19. The BJA NTTAC team will make every effort to regularly update our site if events are cancelled or postponed. However, we encourage you to also check with the event host to confirm event details. If you have any questions, please do not hesitate to contact BJA NTTAC at BJANTTAC@ojp.usdoj.gov or 1-833-872-5174.
This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis...
This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. Topics include the intelligence cycle, analytical thinking skills, the importance of strategic analysis, communication and social media analysis, recommendation development...
This course provides the advanced skills and knowledge necessary to analyze data on iOS devices (iPod Touch, iPhone, and iPad) and Android devices at an advanced level. Students use forensically sound tools and techniques to analyze potential evidence, employing advanced techniques to uncover...
This course provides students with the fundamental knowledge and skills they need to investigate crimes involving virtual currency. Instructors explain foundational concepts like the characteristics of money, virtual currency, and cryptocurrency. Blockchain technology, proof work, and proof of...
The webinar series and “Ask the Expert” sessions were developed under an Office on Violence Against Women grant focused on enhancing victim-centered approaches in community corrections. A victim/survivor-centered approach focuses on the concerns and needs of the victim/survivor to ensure the...
Mobile devices dominate the intake list and the desks of most digital forensics analysts globally. Devices are becoming more secure, with an increase in security; the need for detailed analysis is increasing as well. SQLite is a self-contained, serverless database engine. It is found on nearly...
This course promotes a multiagency approach to the problem of financial exploitation of senior citizens. Bringing together law enforcement personnel and adult protective services investigators, the course enhances students' investigative skills and interviewing techniques while facilitating...
This one-day course provides foundational spreadsheeting knowledge and skills to enhance workplace productivity. The course covers basic navigation of Microsoft Excel by combining live demonstrations and hands-on exercises, including the following:
- Working with multiple worksheets...
This course covers the identification and extraction of artifacts associated with the Microsoft Windows operating system. Topics include the Change Journal, BitLocker, and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs,...
This course provides the fundamental knowledge and skills required to acquire forensic backup images from Windows-based computers and removable storage media in a forensically sound manner.
Presentations and hands-on practical exercises cover the following topics:
- Storage...
Join the National Association of Drug Court Professionals (NADCP) for their conference RISE 21 on Sunday, August 15–18, 2021.
RISE21 brings together judges, law enforcement officials, treatment providers, drug and veterans court coordinators, researchers, celebrities, leading authorities...
This course introduces the problem of intellectual property (IP) theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of...
The pandemic forced changes in probation and parole that resulted in unprecedented drops in the number of people admitted to prison due to supervision violations. Now, state leaders face a critical question: What changes should be carried forward?
Join The Council of State Governments (CSG...
SAKI TTA will host a webinar titled, Advancing Justice: Interviewing and Presenting Testimony of Victims of Violent Crimes, on Wednesday, August 11th from 2:00 PM - 3:30 PM ET. Doors will open at 1:55 PM ET. This webinar will be presented by Patricia D. Powers, Attorney...
This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations....
This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individual’s digital footprint, protecting privacy on social media, and the consequences of oversharing personal information...
Implementing a successful anti-money laundering training program is a challenge in a post-pandemic era. Combining the human element and technology is key to communicating the patterns of money laundering, terrorist financing, and national security threats to financial investigators and anti-...
Mobile devices dominate the intake list and the desks of most digital forensics analysts globally. Devices are becoming more secure, with an increase in security; the need for detailed analysis is increasing as well. SQLite is a self-contained, serverless database engine. It is found on nearly...
This course provides hands-on investigative training at a basic level. Students develop the practical skills, insight, and knowledge necessary to manage a successful financial investigation from start to finish, including the acquisition and examination of financial records, interview skills,...
This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis...
This course prepares students to identify various artifacts typically located in property lists and SQLite databases on MacOS-based computers, and teaches students how to perform forensic analysis. Students gain hands-on practical experience writing basic SQL queries and using them to analyze...
This one-day course, focused on device location information, is for law enforcement investigators and analysts. Class concepts include device identifiers (IDs) in general, advertising IDs in detail, important legal considerations, overall investigative process, and tools available to law...
This webinar provides an overview of human trafficking and how traffickers exploit adults and children in the United States and around the world for financial gain, among other reasons. Topics include financial and behavioral indicators of labor and sex trafficking, in addition to case studies...
This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational...