Delivery Method: Virtual
Location: Online
Duration: 1 Day
Date: 09/12/2023
Time: 9:00 AM – 4:00 PM Eastern
Register Here
This course provides investigators and prosecutors with the knowledge and tools they need to respond to the growing problem of investment fraud. Topics include what constitutes a security, using the Howey Test to determine if a particular offering is a security, identifying investment fraud schemes, and investigative strategies for working with victims and perpetrators.
» Read more
Delivery Method: Virtual
Location: Online
Duration: 4 Days
Date: 09/11/2023 – 09/14/2023
Time: 11:00 AM – 8:00 PM Eastern
Register Here
This course covers the identification and extraction of artifacts associated with the Microsoft® Windows® operating system. Topics include the change journal, BitLocker® , and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs,
» Read more
Delivery Method: Virtual
Location: Online
Duration: 1 Day
Date: 09/06/2023
Time: 9:00 AM – 5:00 PM Eastern
Register Here
This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve digital evidence at a crime scene in a forensically-sound manner. Topics include recognizing potential sources of digital evidence, planning and executing a digital evidence-based seizure, and the preservation,
» Read more
Delivery Method: Virtual
Location: Online
Duration: 1 Day
Date: 08/30/2023
Time: 9:00 AM – 6:00 PM Eastern
Register Here
Mobile devices dominate the intake list and the desks of most digital forensics analysts globally. As devices are becoming more secure, with an increase in security, the need for detailed analysis is increasing as well. SQLite is a self-contained, serverless database engine. It is found on nearly every operating system and dominates iOS®,
» Read more
Delivery Method: Virtual
Location: Online
Duration: 4 Days
Date: 08/28/2023 – 08/31/2023
Time: 9:00 AM – 6:00 PM Eastern
Register Here
This course prepares students to identify various artifacts typically located in property lists and SQLite databases on MacOS-based computers, as well as learn how to perform forensic analysis. Students gain hands-on practical experience writing basic SQL queries and using to analyze operating system artifacts that includes,
» Read more
Delivery Method: Virtual
Location: Online
Duration: 3 Days
Date: 06/25/2024 – 06/27/2024
Time: 9:00 AM – 6:00 PM Eastern
Register Here
This course provides hands-on investigative training at a basic level. Students develop the practical skills, insight, and knowledge necessary to manage a successful financial investigation from start to finish, including the acquisition and examination of financial records, interviewing skills, and case management and organization.
» Read more
Delivery Method: Webinar
Location: Online
Duration: 60 Minutes
Date: 08/10/2023
Time: 1:00PM-2:00PM Eastern
Register Here
The Public Safety Threat Alliance Intelligence team at Motorola Solutions will present their observations and assessments on the trends and developments of cyber activity targeting public safety. They will breakdown the specific tradecraft mapped to the MITRE ATT&CK matrix and detail how threat actors have been adapting to continue to be successful in 2023.
» Read more
Delivery Method: Virtual
Location: Online
Duration: 4 Days
Date: 07/31/2023 – 08/03/2023
Time: 9:00 AM – 5:00 PM Eastern
Register Here
This course prepares students to identify various artifacts typically located in property lists and SQLite databases on MacOS-based computers, as well as learn how to perform forensic analysis. Students gain hands-on practical experience writing basic SQL queries and using them to analyze operating system artifacts that includes,
» Read more
Location: Online
Duration: 3 Days
Date: 06/25/2024 – 06/27/2024
Time: 9:00 AM – 6:00 PM Eastern
Register Here
An effective financial investigation can disrupt terrorism organizations and interrupt, deter, or even stop operational terrorism activities before they can begin. In this three-day course, students develop an understanding of how financial systems are used to support terrorism activities and transnational criminal organizations. Students will work with tools and methods to investigate the manipulation of financial,
» Read more
Delivery Method: Webinar
Location: Online
Duration: 60 Minutes
Date: 07/26/2023
Time: 1:00 PM – 2:00 PM Eastern
Register Here
Due to cultural stigmas, ethnic communities often fail to report human trafficking and migrant victimization crimes making it harder to identify victims. The National Center for Missing and Exploited Children reports suspected child sexual exploitation increased 35 percent from 2020 to 2021 and estimates that there are over 13,000 illicit massage parlors.
» Read more