Mobile Device Examiner (MDE)

Provider: National Computer Forensics Institute (NCFI)

Target Audience: Officers

Topic Area: Cyber Forensics, Cyber Investigations, Mobile Forensics

Event Type: Training

Delivery Method: Classroom

MDE is a 20 day course designed to provide hands-on experience with mobile devices. Investigators will gain experience with a wide array of mobile devices such as cell phones, GPS units, and tablets, forensics analysis tools, legal issues, and report generation for law enforcement. The course combines instructor-led discussions and practical exercises to teach methodologies and techniques used during investigations involving digital evidence of mobile devices with traditional investigative techniques.

After completing this course,

 » Read more


Click here for more information

Wi-Fi Tools for Analysis and GEO-Locating (WTAG)

Provider: Federal Law Enforcement Training Centers (FLETC)

Target Audience: Officers

Topic Area: Cyber Forensics, Cyber Investigations

Event Type: Training

Delivery Method: Classroom

The Wi-Fi Tools for Analysis and GEO-Locating (WTAG) training program is designed to review the capability of hidden devices in structures, peer-to-peer hidden communication through use of common devices such as PSP, Nintendo DS, iPhones and geo-location of those Wi-Fi devices. The program will also review real-world circumstance of Wi-Fi being involved in Child Pornography, Terrorism, and Child Exploitation.

 » Read more


Click here for more information

Seized Computer Evidence Recovery Specialist (SCERS)

Provider: Federal Law Enforcement Training Centers (FLETC)

Target Audience: Officers

Topic Area: Cyber Forensics, Cyber Investigations

Event Type: Training

Delivery Method: Classroom

The Seized Computer Evidence Recovery Specialist (SCERS) training program teaches fundamental forensic techniques for the analysis of electronic data from Windows desktop computer systems and selected peripherals. While the program is an advanced training for FLETC, it is designed as a comprehensive digital forensics introductory program of instruction for novice examiners or those who wish to update their skill/tool set.

 » Read more


Click here for more information

Digital Evidence Collection in an Enterprise Environment (DECEE)

Provider: Federal Law Enforcement Training Centers (FLETC)

Target Audience: Officers

Topic Area: Cyber Forensics, Cyber Investigations

Event Type: Training

Delivery Method: Classroom

The Digital Evidence Collection in an Enterprise Environment (DECEE) is designed to train criminal investigators (or those that routinely serve as part of the investigative team) to identify, search, seize and acquire digital media in a network environment. Investigators are routinely finding that the evidence they need in the furtherance of any investigation may be found on servers regardless of the type of investigation they are conducting. The purpose of this program is to give investigators an understanding of how to identify the server software in question,

 » Read more


Click here for more information

Windows Forensic Environment On-Scene Triage

Provider: SEARCH

Topic Area: Cyber Forensics, Cyber Investigations

Event Type: Training

Delivery Method: Classroom

Law enforcement agencies strive to equip first responders with the tools and training they need to investigate a crime scene that has a technology component. WinFE (Windows Forensic Environment) is a tool that helps with that. By using a USB thumb drive that has been preconfigured with WinFE, investigators can preview a suspect computer in the field to determine if the device holds any evidence of criminal activity. WinFE is forensically sound, meaning it does not alter the suspect computer in any way.

 » Read more


Click here for more information

Digital Evidence Examination and Processing (DEEP)

Provider: National White Collar Crime Center (NW3C)

Target Audience: Officers

Topic Area: Cyber Forensics, Cyber Investigations

Event Type: Training

Delivery Method: Classroom

This course builds on the concepts introduced in CC 101 (BDFI). It covers the architecture and functionality of the Windows NT File System (NTFS), the FAT and the ExFAT File System, and related directory entry information for locating files on electronic devices. Topical areas include file headers and file hashing, recovery of deleted files and long file names, and techniques for discovering potential evidence that might otherwise be overlooked. This course incorporates an investigative scenario,

 » Read more


Click here for more information

Basic Network Intrusion Investigations  (BNII)

Provider: National White Collar Crime Center (NW3C)

Target Audience: Officers

Topic Area: Cyber Forensics, Cyber Investigations, Cyber Security

Event Type: Training

Delivery Method: Classroom

This course covers the skills and techniques involved in responding to a network security incident. The course focuses on the identification, extraction, and detailed examination of artifacts associated with network and intrusions. Memory analysis, host machine forensics, network traffic and log analysis, malware analysis, and virtual machine sandboxing are covered through lecture, discussion, and hands-on exercises. Additional topics include key cybersecurity concepts and issues, as well as the various classifications and types of network attacks.

 » Read more


Click here for more information

Basic Digital Forensic Imaging (BDFI)

Provider: National White Collar Crime Center (NW3C)

Target Audience: Officers

Topic Area: Cyber Forensics, Cyber Investigations

Event Type: Training

Delivery Method: Classroom

This course covers the fundamentals of computer operations, hardware function, configuration, and best practices for the protection, preservation, and imaging of digital evidence. Presentations and hands-on exercises cover topics such as partitioning, data storage, hardware and software write blockers, the bootup and shutdown processes, live imaging, encryption detection, and duplicate imaging. This course incorporates computer forensic applications that experienced practitioners are currently using in the field.

 » Read more


Click here for more information

IACP Conference