This online course covers basic information and concepts that serve as an introduction to virtual currencies and their relationship to other types of currency. The course describes different types of virtual currencies and covers the main differences between decentralized and centralized currencies. Focusing on Bitcoin®, students will learn what Bitcoin is, how it is stored, and what are some investigative tips for law enforcement.
» Read more
Click here for more information
This course provides an overview of the two phases of a cell phone investigation: the preservation, extraction, and analysis of data within the phone; and the acquisition and analysis of data external to the phone (call detail records and other information). Students become familiar with several forensic tools currently in use in the field, as well as NW3C’s PerpHound™, a specialized tool that assists in plotting historical cell site locations. Other topics include cell phone components,
» Read more
Click here for more information
This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individual’s digital footprint, protecting privacy on social media, opting out of data aggregator sites, and the consequences of oversharing personal information; as well as steps to take after becoming a target of doxing.
» Read more
Click here for more information
This interactive online module provides an overview of the basic concepts behind secure previewing of digital devices. Students become familiar with both onsite and offsite secure previewing, and learn to identify the two states in which a preview can be conducted (live-box and dead-box previewing). At the completion of the course, students will be able to recognize the recommended collection order of volatile data (the “order of volatility”).
» Read more
Click here for more information
On Demand
Duration: 90 Minutes
Early identification and recovery of digital evidence are critical for an investigation, and the amount and types of technical evidence have grown exponentially. This webinar will discuss digital “footprints” that can help you during your investigations, no matter your technical background. We will discuss victim-based, suspect-based, and location-based ways of finding evidence to include innovative ways of seeing a crime scene through different technologies. Remember, even though your suspect’s device did not “connect”
» Read more
Click here for more information
On Demand
Duration: 75 Minutes
Join a team of experts from NW3C as they provide thoughtful and detailed answers to the high-tech crime questions you submit.
» Read more
Click here for more information
On Demand
Duration: 90 Minutes
Early identification and recovery of digital evidence are critical for an investigation, and the amount and types of technical evidence have grown exponentially. This webinar will discuss digital “footprints” that can help you during your investigations, no matter your technical background. We will discuss victim-based, suspect-based, and location-based ways of finding evidence to include innovative ways of seeing a crime scene through different technologies. Remember, even though your suspect’s device did not “connect”
» Read more
Click here for more information
On Demand
Duration: 70 Minutes
This webinar provides fundamental knowledge about human trafficking including defining the crime, addressing why it occurs and why it is unique, reviewing the relevant human trafficking criminal laws, and providing information on how to identify human trafficking, start an investigation, and prosecute the case.
» Read more
Click here for more information
Understanding the forensic process is critical for a prosecutor navigating a criminal case with digital evidence. Prosecutors will dive deep into computers and mobile devices to find hidden artifacts, and learn to analyze multiple data sources together. ADEP is a 5-day course that provides every attendee with the requisite skills using a combination of lecture and practical exercises. One hour of ethics instruction will be included.
During this course, you will learn:
- The Forensic Process for Computers and Mobile Devices
- Sources of Digital Evidence
- OSX/Windows and their Respective Forensic Artifacts
- Data Carving
- Digital Data Analytics
- Search and Seizure of Digital Evidence
- Writing Search Warrants
- Cloud Storage
- Encryption
- Networks: Email,
» Read more
Click here for more information
MDE is a 20 day course designed to provide hands-on experience with mobile devices. Investigators will gain experience with a wide array of mobile devices such as cell phones, GPS units, and tablets, forensics analysis tools, legal issues, and report generation for law enforcement. The course combines instructor-led discussions and practical exercises to teach methodologies and techniques used during investigations involving digital evidence of mobile devices with traditional investigative techniques.
After completing this course,
» Read more
Click here for more information