FC130 Targeting Investment Fraud

TIF

Delivery Method: Virtual
Location: Online
Duration: 1 Day
Date: 09/12/2023
Time: 9:00 AM – 4:00 PM Eastern

Register Here

This course provides investigators and prosecutors with the knowledge and tools they need to respond to the growing problem of investment fraud. Topics include what constitutes a security, using the Howey Test to determine if a particular offering is a security, identifying investment fraud schemes, and investigative strategies for working with victims and perpetrators.

 » Read more

ICAC-DF310 Advanced Digital Forensic Analysis: Windows

ICAC-ADFA-Win

Delivery Method: Virtual
Location: Online
Duration: 4 Days
Date: 09/11/2023 – 09/14/2023
Time: 11:00 AM – 8:00 PM Eastern

Register Here

This course covers the identification and extraction of artifacts associated with the Microsoft® Windows® operating system. Topics include the change journal, BitLocker® , and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs,

 » Read more

ICAC-DF100 Basic Digital Forensic Analysis: Seizure

ICAC-BDFA-Seizure (1)

Delivery Method: Virtual
Location: Online
Duration: 1 Day
Date: 09/06/2023
Time: 9:00 AM – 5:00 PM Eastern

Register Here

This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve digital evidence at a crime scene in a forensically-sound manner. Topics include recognizing potential sources of digital evidence, planning and executing a digital evidence-based seizure, and the preservation,

 » Read more

ICAC-DF205 Intermediate Digital Forensic Analysis: SQLite Primer

ICAC-IDFA-SQLite

Delivery Method: Virtual
Location: Online
Duration: 1 Day
Date: 08/30/2023
Time: 9:00 AM – 6:00 PM Eastern

Register Here

Mobile devices dominate the intake list and the desks of most digital forensics analysts globally. As devices are becoming more secure, with an increase in security, the need for detailed analysis is increasing as well. SQLite is a self-contained, serverless database engine. It is found on nearly every operating system and dominates iOS®,

 » Read more

ICAC-DF320 Advanced Digital Forensic Analysis: macOS

ICAC-ADFA-Mac

Delivery Method: Virtual
Location: Online
Duration: 4 Days
Date: 08/28/2023 – 08/31/2023
Time: 9:00 AM – 6:00 PM Eastern

Register Here

This course prepares students to identify various artifacts typically located in property lists and SQLite databases on MacOS-based computers, as well as learn how to perform forensic analysis. Students gain hands-on practical experience writing basic SQL queries and using to analyze operating system artifacts that includes,

 » Read more

Financial Investigations Practical Skills

FIPS

Delivery Method: Virtual
Location: Online
Duration: 3 Days
Date: 06/25/2024 – 06/27/2024
Time: 9:00 AM – 6:00 PM Eastern

Register Here

This course provides hands-on investigative training at a basic level. Students develop the practical skills, insight, and knowledge necessary to manage a successful financial investigation from start to finish, including the acquisition and examination of financial records, interviewing skills, and case management and organization.

 » Read more

Developments and Trends of 2023 Cyber Attacks to Public Safety

P

Delivery Method: Webinar
Location: Online
Duration: 60 Minutes
Date: 08/10/2023
Time: 1:00PM-2:00PM Eastern

Register Here

The Public Safety Threat Alliance Intelligence team at Motorola Solutions will present their observations and assessments on the trends and developments of cyber activity targeting public safety. They will breakdown the specific tradecraft mapped to the MITRE ATT&CK matrix and detail how threat actors have been adapting to continue to be successful in 2023.

 » Read more

DF320 Advanced Digital Forensic Analysis: macOS

ADFA-Mac (1)

Delivery Method: Virtual
Location: Online
Duration: 4 Days
Date: 07/31/2023 – 08/03/2023
Time: 9:00 AM – 5:00 PM Eastern

Register Here

This course prepares students to identify various artifacts typically located in property lists and SQLite databases on MacOS-based computers, as well as learn how to perform forensic analysis. Students gain hands-on practical experience writing basic SQL queries and using them to analyze operating system artifacts that includes,

 » Read more

FC204 Combating Transnational Crime & Terrorism Financing

CTCTF

Location: Online
Duration: 3 Days
Date: 06/25/2024 – 06/27/2024
Time: 9:00 AM – 6:00 PM Eastern

Register Here

An effective financial investigation can disrupt terrorism organizations and interrupt, deter, or even stop operational terrorism activities before they can begin. In this three-day course, students develop an understanding of how financial systems are used to support terrorism activities and transnational criminal organizations. Students will work with tools and methods to investigate the manipulation of financial,

 » Read more

Increasing Law Enforcement Effectiveness in Human Trafficking and Migrant Victimization from the Survivor’s Perspective

HTMV

Delivery Method: Webinar
Location: Online
Duration: 60 Minutes
Date: 07/26/2023
Time: 1:00 PM – 2:00 PM Eastern

Register Here

Due to cultural stigmas, ethnic communities often fail to report human trafficking and migrant victimization crimes making it harder to identify victims. The National Center for Missing and Exploited Children reports suspected child sexual exploitation increased 35 percent from 2020 to 2021 and estimates that there are over 13,000 illicit massage parlors. 

 » Read more

IACP Conference