The Seized Computer Evidence Recovery Specialist (SCERS) training program teaches fundamental forensic techniques for the analysis of electronic data from Windows desktop computer systems and selected peripherals. While the program is an advanced training for FLETC, it is designed as a comprehensive digital forensics introductory program of instruction for novice examiners or those who wish to update their skill/tool set.
» Read more
Click here for more information
The Recovery of Evidence from CCTV Video Recording (RECVR) is designed to provide the responding officer and/or the investigator with the best practices for recognizing, collecting, and properly transporting sensitive digital video evidence from crime scenes in such a manner that preserves the evidentiary integrity of the video. Emphasis is placed on collection of evidence, preserving the evidentiary integrity of the video and utilization of correct software to accurately play and review the collected video.
» Read more
Click here for more information
The Mobile Device Investigations Program (MDIP) is designed to provide investigators with the training necessary to complete a forensically sound, logical acquisition of digital evidence from mobile devices. It also includes an understanding of cell technologies, practical application of historical tracking, and the skills to frame an investigation from evidence obtained through call detail records.
» Read more
Click here for more information
The Digital Evidence Collection in an Enterprise Environment (DECEE) is designed to train criminal investigators (or those that routinely serve as part of the investigative team) to identify, search, seize and acquire digital media in a network environment. Investigators are routinely finding that the evidence they need in the furtherance of any investigation may be found on servers regardless of the type of investigation they are conducting. The purpose of this program is to give investigators an understanding of how to identify the server software in question,
» Read more
Click here for more information
The Digital Evidence Acquisition Specialist Training (DEASTP) is designed to equip criminal investigators with the knowledge, skills, and abilities to properly identify, seize and acquire digital evidence. Through a combination of lecture, demonstration, hands on exercises, labs and a practical exercise investigators learn how to seize digital evidence from personal computer (PC) and notebook computer hard drives, floppy diskettes, compact disks (CDs), DVDs, thumb drives, and various flash media by acquiring forensically valid images of the digital media.
» Read more
Click here for more information
The Basic Incident Response to Digital Evidence (BIRDE) provides training necessary to any criminal investigator who may be a first responder in a situation in which computer based evidence is or may be recovered. While not being overwhelmingly technical in delivery, this program provides a sufficient overview of technology in order to adequately prepare the criminal investigator for taking proper steps necessary to identify, collect, acquire, and preserve digital evidence during the conduct of an investigation.
» Read more
Click here for more information
As an investigator, you know how important it is to search for, locate, save, and replicate online information relating to all areas of crime. Because web pages and content can quickly appear and vanish, you need to continuously document your findings. Let us show you the latest tools, tips, and techniques that will keep your investigation moving forward. We’ll start by teaching you the steps to take to ensure you don’t tip off your suspect by leaving a digital footprint during your investigation.
» Read more
Click here for more information
This course introduces learners to the world of social media, including fundamental concepts, trends and benefits for law enforcement organizations. This course examines how the most popular social media platforms like Facebook and Instagram work, and how people tend to use them. This course also introduces other social media platforms and apps, such as Snapchat and Periscope. There is a strong focus on social media as a tool for law enforcement, including designating a social media officer and establishing an agency social media policy for official and personal use.
» Read more
Click here for more information
This course builds on the concepts introduced in CC 101 (BDFI). It covers the architecture and functionality of the Windows NT File System (NTFS), the FAT and the ExFAT File System, and related directory entry information for locating files on electronic devices. Topical areas include file headers and file hashing, recovery of deleted files and long file names, and techniques for discovering potential evidence that might otherwise be overlooked. This course incorporates an investigative scenario,
» Read more
Click here for more information
This course covers the skills and techniques involved in responding to a network security incident. The course focuses on the identification, extraction, and detailed examination of artifacts associated with network and intrusions. Memory analysis, host machine forensics, network traffic and log analysis, malware analysis, and virtual machine sandboxing are covered through lecture, discussion, and hands-on exercises. Additional topics include key cybersecurity concepts and issues, as well as the various classifications and types of network attacks.
» Read more
Click here for more information