The Public Safety Threat Alliance Intelligence team will walk through the most frequent and impactful attack paths observed by threat actors targeting public safety organizations around the world. Using the MITRE ATT&CK matrix, we will breakdown the tradecraft observed targeting emergency...
BJA NTTAC's online TTA Catalog is a feature for BJA TTA providers to market upcoming webinars, training opportunities, and technical assistance to the justice community based on their needs and locations. The BJA NTTAC team also shares conferences, trainings, and events from across the field that may be of interest to the justice community.
The “Training Catalog” tab lists webinars, training opportunities, and conferences, both upcoming and completed within the past year, while the “Event Calendar” displays these webinars, trainings, and conferences in a monthly calendar view. The “Upcoming Events” tab only displays upcoming webinars, training opportunities, and conferences. The “TTA Resources” tab displays technical assistance, defined as specialized guidance on a particular topic, tailored to a requesting agency; programs, defined as larger TTA programs offered by BJA TTA providers that have various offerings on a particular topic; and training. Lastly, the “BJA TTA Grantees” tab displays a list of current BJA TTA grantees.
This course provides hands-on investigative training at a basic level. Students develop the practical skills, insight, and knowledge necessary to manage a successful financial investigation from start to finish, including the acquisition and examination of financial records, interview skills,...
This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis...
National Police Week occurs every May.
In 1962, President Kennedy proclaimed May 15 as National Peace Officers Memorial Day and the calendar week in which May 15 falls, as National Police Week. Established by a joint resolution of Congress in 1962, National Police Week pays special...
This course covers the identification and extraction of artifacts associated with the Microsoft Windows operating system. Topics include the Change Journal, BitLocker, and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs,...
Provide roadway safety training to your agency. Attend this 8-hour course where trainers will be given the resources and skills needed to teach the NLERSP training curriculum to other officers during academy or in-service training. Prerequisite: Trainers must complete the Roadway Safety for...
Learn how to improve your safety on the roadways. This 8-hour course will discuss best practices and tactics to improve your safety during traffic stops, emergency response driving, all-weather driving, and roadway operations while outside of your vehicle.
Mobile devices dominate the intake list, and the desks of most digital forensics analyst globally. Devices are becoming more secure, with an increase in security the need for detailed analysis is increasing as well. SQLite is a self-contained, serverless database engine. It is found on nearly...
This course covers basic intelligence writing and briefing principles as well as methods for effective and clear intelligence sharing. Topics covered include creative and critical thinking, critical reading skills, source evaluation, privacy and civil rights, intelligence writing style and...
This three-day course covers the fundamentals of financial investigations and incorporates some of the more advanced processes that elevate an investigation. During this course, students will learn about investigative processes, practical tools, and sources of information necessary to plan and...
This course builds on the concepts introduced in FC101 (FIPS) and FC105 (FREA), introducing investigators and prosecutors to emerging issues in financial crime. Topics include money laundering, analyzing large financial data sets, conducting effective interviews, and managing large amounts of...
Community relations is among the most consequential challenges facing law enforcement agencies across the United States of America. With support from the U.S. Department of Justice, Bureau of...
This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers; and how to plot cellular site locations...
This course promotes a multi-agency approach to the problem of financial exploitation of senior citizens. Bringing together law enforcement personnel and adult protective services investigators, the course enhances students investigative skills and interviewing techniques while facilitating...
Provide roadway safety training to your agency. Attend this 8-hour course where trainers will be given the resources and skills needed to teach the NLERSP training curriculum to other officers during academy or in-service training. Prerequisite: Trainers must complete the Roadway Safety for...
Learn how to improve your safety on the roadways. This 8-hour course will discuss best practices and tactics to improve your safety during traffic stops, emergency response driving, all-weather driving, and roadway operations while outside of your vehicle.
This one-day course provides foundational spreadsheeting knowledge and skills to enhance workplace productivity. The course covers basic navigation of Microsoft Excel by combining live demonstrations and hands-on exercises. Work with multiple worksheets within a workbook Hide, unhide, and...
This course is for officers, investigators, and analysts who encounter cell phone evidence that includes information external to the phone. Class concepts include instruction on how to request, read, and analyze call detail records from cellular providers; and how to plot cellular site locations...
This course provides hands-on investigative training at a basic level. Students develop the practical skills, insight, and knowledge necessary to manage a successful financial investigation from start to finish, including the acquisition and examination of financial records, interview skills,...
Face it, pain management with medication and surgery is not always effective and definitely not a long-term solution. This is where nutrition shines! Eating foods that dampen inflammation is one of the most useful and powerful tools you have to reduce and manage pain. In this webinar, you will...
This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations....
An effective financial investigation can disrupt terrorism organizations and interrupt, deter, or even stop operational terrorism activities before they can begin. In this three-day course, students develop an understanding of how financial systems are used to support terrorism activities and...
This course introduces the problem of intellectual property theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of...
This course provides the fundamental knowledge and skills required to acquire forensic backup images of commonly encountered forms of digital evidence (Microsoft Windows based computers and external storage devices) in a forensically sound manner. Presentations and hands-on practical exercises...
This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis...