IN-PERSON TRAINING - National White Collar Crime Center

1y ago
4 Views
2 Downloads
901.42 KB
32 Pages
Last View : 28d ago
Last Download : 3m ago
Upload by : Jewel Payne
Transcription

IN-PERSON TRAININGTECHNICAL ASSISTANCEIn the last five years, NW3C has trained nearly 40,000 students inall 50 states. In-person training features student-centered, hands-onpractical exercises.Each year, NW3C provides hundreds of hours of technicalassistance to law enforcement, regulatory agencies, andprosecutorial agencies that investigate economic and high-techcrime.Since 2014, NW3C has offered high-quality, on-demand trainingaround the clock, via a robust in-house online learning platform thathas reached over 98,000 students.ONLINE TRAININGLIVE ONLINE TRAININGWEBINARSTOOLS AND RESOURCESPROSECUTORS AND JUDGESNW3C live online training is 100% instructor-led and allows youto learn remotely in an interactive virtual environment. Studentswill learn in-depth material during lectures, hands-on exercises,and breakout sessions. Get the same benefits of a traditionalclassroom setting while learning virtually.NW3C webinars are a convenient way to learn more about newand emerging topics related to the investigation and prosecution ofeconomic and high-tech crime. Many webinars feature nationallyand internationally recognized subject matter experts.NW3C creates, maintains, updates, and distributes valuable forensictools to law enforcement professionals free of charge. Resourceslike the Law Enforcement Cyber Center (LECC) provide news andinformation.NW3C designs and delivers specialized training for prosecutorsand judges, giving them the skills to litigate and adjudicate casesinvolving economic and high-tech crime.This project was supported by Grant NO. 2018-MU-BX-K001 awarded by the Bureau of JusticeAssistance. The Bureau of Justice assistance is a component of the Department of Justice’s Officeof Justice Programs, which also includes the Bureau of Justice Statistics, the National Institute ofJustice, the Office of Juvenile Justice and Delinquency Prevention, the Office for Victims of Crime,and the SMART office. Points of view or opinions in this document are those of the author and donot necessarily represent the official position or policies of the U.S. Department of Justice.1

CLASSROOM AND LIVE ONLINE COURSESCI101BCI-DFBASIC CYBER INVESTIGATIONS: DIGITAL FOOTPRINTS6CI102BCI-DW/OSINTBASIC CYBER INVESTIGATIONS: DARK WEB & OPEN SOURCE INTELLIGENCE6CI103BCI-ADIDBASIC CYBER INVESTIGATIONS: ADVERTISING IDENTIFIERS6CI130BCI-CRABASIC CYBER INVESTIGATIONS: CELLULAR RECORDS ANALYSIS7CI240ICI-VCINTERMEDIATE CYBER INVESTIGATIONS: VIRTUAL CURRENCY7DF100BDFA-SEIZUREBASIC DIGITAL FORENSIC ANALYSIS: SEIZURE7DF101BDFA-WIN-ACQBASIC DIGITAL FORENSIC ANALYSIS: WINDOWS ACQUISITION8DF201IDFA-AFTINTERMEDIATE DIGITAL FORENSIC ANALYSIS: AUTOMATED FORENSIC TOOLS8DF205IDFA-SQLITEINTERMEDIATE DIGITAL FORENSIC ANALYSIS: SQLITE PRIMER8DF310ADFA-WINADVANCED DIGITAL FORENSIC ANALYSIS: WINDOWS 9DF320ADFA-MACADVANCED DIGITAL FORENSIC ANALYSIS: macOS 9DF330ADFA-MOBILE IADVANCED DIGITAL FORENSIC ANALYSIS: iOS & ANDROID 9FT SERIESDIGITAL FORENSICS: FAST TRACK10FC099BLSSBASIC LEVEL SPREADSHEETING SKILLS10FC101FIPSFINANCIAL INVESTIGATIONS PRACTICAL SKILLS10FC102FITFINANCIAL INVESTIGATIONS TRIAGE11FC105FREAFINANCIAL RECORDS EXAMINATION AND ANALYSIS11FC110FCASFINANCIAL CRIMES AGAINST SENIORS11FC111FCSSFINANCIAL CRIMES AGAINST SENIORS SEMINAR12FC122IPTTINTELLECTUAL PROPERTY THEFT TRAINING122

FC201FRISFINANCIAL RECORDS INVESTIGATIVE SKILLS12FC210MLCMONEY LAUNDERING & COMMINGLING13IA101FIATFOUNDATIONS OF INTELLIGENCE ANALYSIS TRAINING13IA102ILAINTRODUCTION TO LINK ANALYSIS13IA103ISIAINTRODUCTION TO STRATEGIC INTELLIGENCE14IA105IWABINTELLIGENCE WRITING AND BRIEFING14PT201DEBDIGITAL EVIDENCE BASICS & THE CLOUD ACT14PT230MEPMOBILE EVIDENCE FOR PROSECUTORS15ONLINE COURSESCI091ITP-WBINTRODUCTION TO PREVIEWING15CI101UDF-WBUNDERSTANDING DIGITAL FOOTPRINTS15CI103ICPI-WBINTRODUCTION TO CELL PHONE INVESTIGATIONS16CI104VC-WBVIRTUAL CURRENCY16CI106AI-WBAPPLE BTHE DARK WEB: AN INTRODUCTION17CI131ISMN-WBINTRODUCTION TO SOCIAL MEDIA AND NETWORKING17CI151LC1-WBFIRST RESPONDERS & DIGITAL EVIDENCE18CI152LC2-WBSEARCH WARRANTS & DIGITAL EVIDENCE18CI153LC3-WBSEARCHING WITHOUT A WARRANT183

CI155LC5-WBONLINE UNDERCOVER19CI156LC6-WBPOST-SEIZURE EVIDENTIARY CONCERNS19CI157LC7-WBMOBILE DIGITAL DEVICES & GPS19CI220UAV-WBINVESTIGATING INCIDENTS INVOLVING UAVS20CS100ICN-WBINTRODUCTION TO COMPUTER NETWORKS20DF091ENC2-WBENCRYPTION20DF099HDS-WBHOW COMPUTERS WORK AND STORE DATA21DF100BDFA-SEIZURE-WBBASIC DIGITAL FORENSIC ANALYSIS: SEIZURE21FC100WCC-WBOVERVIEW OF WHITE COLLAR CRIME21FC104FIB-WBFINANCIAL INVESTIGATION BASICS22FC115MORF-WBINTRODUCTION TO MORTGAGE FRAUD22FC123IPT-WBINTELLECTUAL PROPERTY THEFT: TIME TO MAKE A DIFFERENCE22FC141HTA-WBHUMAN TRAFFICKING AWARENESS FOR LAW ENFORCEMENT OFFICERS23FC151BSA-WBTHE BANK SECRECY ACT: WHAT LAW ENFORCEMENT NEEDS TO KNOW23FC175VCS-WBVICTIM-CENTERED SOLUTIONS TO ELDER EXPLOITATION23IA098IINT-WBINTRODUCTION TO INTELLIGENCE24IA099BASR-WBBASIC ANALYST SKILLS AND REQUIREMENTS24IA100PGIAE-WBPOLICIES AND GUIDANCE FOR INTELLIGENCE ANALYSTS EXERCISE24PT100PT-WBINTRODUCING DIGITAL EVIDENCE IN COURT25PT110PDW-WBPROSECUTING THE DARK WEB254

TOOLS & RESOURCESPT152PT2-WBSEARCH WARRANTS AND DIGITAL EVIDENCE25PT153PT3-WBSEARCHING WITHOUT A WARRANT26PT160LCCI-WBLEGAL CHALLENGES TO CRIMINAL INVESTIGATIONS26RESOURCESWEBINARS26RESOURCESMOBILE FRIENDLY TUAL PROPERTY (IP) WEBSITE27RESOURCESCYBER S.W.A.T. 28RESOURCESLAW ENFORCEMENT CYBER CENTER28FORENSIC TOOLSNW3C UTILITY SUITE 29FORENSIC TOOLSPERPHOUND 30FORENSIC TOOLSPHOTOHUNTER 30FORENSIC TOOLSREPORT GENERATOR 305

CI 101C Y B E R I N V E S T I G AT I O N SQuick Info1 DAYCLASSROOMBCI-DFBASIC CYBER INVESTIGATIONS: DIGITALFOOTPRINTSThis course introduces learners to the concept of digitalfootprints and best practices in protecting personally identifiableinformation (PII). Topics include limiting an individual’s digitalfootprint, protecting privacy on online social media, and theconsequences of oversharing personal information, along withsteps to take after becoming a target of doxing.LIVE ONLINECI 102C Y B E R I N V E S T I G AT I O N SQuick Info3 DAYCLASSROOMLIVE ONLINECI 103C Y B E R I N V E S T I G AT I O N SQuick Info1 DAYCLASSROOMLIVE ONLINE6BCI-DW/OSINTBASIC CYBER INVESTIGATIONS: DARK WEB& OPEN SOURCE INTELLIGENCEThis course provides expert guidance in the skills that law enforcementofficers need to conduct successful online investigations. Topics includeIP addresses and domains, an overview of currently popular online socialmedia platforms, best practices for building an online undercover profile,foundational knowledge related to the dark web, and recovery of forensicevidence from the dark web. Instructors demonstrate both open sourceand commercially available investigative tools for evidence collection andrecovery of forensic artifacts associated with online social networkingand online social media. Automated tools to crawl websites and preserveonline evidence are also demonstrated.BCI-ADIDBASIC CYBER INVESTIGATIONS:ADVERTISING IDENTIFIERSThis course teaches law enforcement investigators andanalysts methods for handling cases where device locationinformation may be of importance. Topics include deviceidentifiers (IDs) in general, advertising IDs in detail, importantlegal considerations, overall investigative process, and tools available tolaw enforcement. Students will use commercially available investigativetools for querying databases of advertising IDs and displaying theirrecorded broadcast locations.

CI 130C Y B E R I N V E S T I G AT I O N SQuick Info1 DAYCLASSROOMBCI-CRABASIC CYBER INVESTIGATIONS: CELLULARRECORDS ANALYSISThis course is designed for officers, investigators, and analysts whoencounter cell phone evidence retained by cellular carriers. Classconcepts include instruction on how to preserve, request, interpret,analyze, and present call detail records from cellular providers, and howto plot cellular site locations to determine the approximate position of adevice during a given period. No special hardware or software is required.LIVE ONLINECI 240C Y B E R I N V E S T I G AT I O N SQuick Info3 DAYCLASSROOMLIVE ONLINEDF 100D I G I TA L FO R E N S I C SQuick Info1 DAYICI-VCINTERMEDIATE CYBER INVESTIGATIONS:VIRTUAL CURRENCYThis course provides students with the fundamental knowledge and skillsthey need to investigate crimes involving virtual currency. Instructorsexplain foundational concepts like the characteristics of money, virtualcurrency, and cryptocurrency. Blockchain technology, proof of work,and proof of stake are covered and students learn how industry-leadingcryptocurrencies (Bitcoin , Ethereum , and Monero) work and how theydiffer from each other. Finally, students learn investigative techniques fortracking and documenting transactions, and best practices for seizingand securing cryptocurrency. Hands-on exercises include: opening abitcoin wallet, bitcoin transactions, investigating the blockchain, andidentifying services using free/open source explorers.BDFA-SEIZUREBASIC DIGITAL FORENSIC ANALYSIS: SEIZUREThis course introduces the information and techniques law enforcementpersonnel need to safely and methodically collect and preserve digitalevidence at a crime scene in a forensically-sound manner. Topicsinclude recognizing potential sources of digital evidence; planningand executing a digital evidence-based seizure; and the preservation,collection, documentation, and transfer of digital evidence.CLASSROOMLIVE ONLINE7

DF 101D I G I TA L FO R E N S I C SQuick Info3 DAYCLASSROOMBDFA-WIN-ACQBASIC DIGITAL FORENSIC ANALYSIS:WINDOWS AQUISITIONThis course provides the fundamental knowledge and skills required toacquire forensic backup images of commonly encountered forms of digitalevidence (Microsoft Windows based computers and external storagedevices) in a forensically sound manner. Presentations and hands-onpractical exercises cover topics on storage media and how data is stored,the forensic acquisition process, tool validation, hardware and softwarewrite blockers, forensic backup image formats, and multiple forensicacquisition methods. Students will use third party tools, both free andcommercial, that are currently used by practitioners in the field.LIVE ONLINEDF 201D I G I TA L FO R E N S I C SQuick Info4 DAYCLASSROOMLIVE ONLINEDF 205D I G I TA L FO R E N S I C SQuick Info1 DAYCLASSROOMLIVE ONLINE8IDFA-AFTINTERMEDIATE DIGITAL FORENSICANALYSIS: AUTOMATED FORENSIC TOOLSThis course provides students with the fundamental knowledge andskills necessary to perform a limited digital forensic examination, validatehardware and software tools, and effectively use digital forensic suitesand specialized tools. The course begins with a detailed explanation ofthe digital forensic examination process, including documentation, casemanagement, evidence handling, validation, and virtualization. Studentslearn to use today’s leading commercial and open source digital forensicsuites: Magnet Forensics Axiom , X-Ways Forensics , and Autopsy .Instruction on each suite will include an interface overview, configuration,hashing, file signature analysis, keyword searching, data carving,bookmarking, and report creation.IDFA-SQLITEINTERMEDIATE DIGITAL FORENSICANALYSIS: SQLITE PRIMERMobile devices dominate the intake list and the desks of most digitalforensics’ analysts globally. As devices are becoming more secure, withan increase in security; the need for detailed analysis is increasing aswell. SQLite is a self-contained, serverless database engine. It is found onnearly every operating system and dominates iOS , Android , and macOS as one of the most prevalent and relevant data storage mechanisms.Rather than hope our forensic tools support the newest applications or betethered to how a certain utility parses data, we can arm ourselves withthe skills and techniques needed to conquer the analysis of nearly anyapplication.

DF 310D I G I TA L FO R E N S I C SQuick Info4 DAYCLASSROOMADFA-WINADVANCED DIGITAL FORENSIC ANALYSIS:WINDOWSThis course covers the identification and extraction of artifacts associatedwith the Microsoft Windows operating system. Topics include the ChangeJournal, BitLocker , and a detailed examination of various artifacts found ineach of the Registry hive files. Students also examine Event Logs, VolumeShadow Copies, link files, and jump lists. This course uses a mixture oflecture, discussion, demonstration, and hands-on exercises.LIVE ONLINEDF 320D I G I TA L FO R E N S I C SQuick Info4 DAYCLASSROOMLIVE ONLINEDF 330D I G I TA L FO R E N S I C SQuick Info4 DAYCLASSROOMLIVE ONLINEADFA-MacADVANCED DIGITAL FORENSIC ANALYSIS:macOSThis course teaches students to identify and collect volatile data, acquireforensically-sound images of Apple Macintosh computers, and performforensic analysis of macOS operating system and application artifacts.Students gain hands-on experience scripting and using automated toolsto conduct a simulated live triage and use multiple methods to acquireforensically-sound images of Apple Macintosh computers. Topics include howthe macOS default file system stores data, what happens when files are sent tothe macOS Trash, where operating system and application artifacts are stored,and how they can be analyzed. Forensic artifacts covered include passwordrecovery, recently opened files and applications, encryption handling, Mail,Safari , Messages, Facetime , Photos, Chrome , and Firefox .ADFA-MOBILE IADVANCED DIGITAL FORENSIC ANALYSIS:iOS & ANDROIDThis course provides the fundamental knowledge and skills necessaryto preserve, acquire, and analyze data on iOS devices, (iPod Touch ,iPhone , and iPad ) as well as various Android devices. Studentsuse forensically-sound tools and techniques to acquire and analyzepotential evidence. Topics include identifying potential threats to datastored on devices, available imaging options, accessing locked devices,and the default folder structure. The forensic artifacts covered includedevice information, call history, voicemail, messages, web browserhistory, contacts, and photos.9

DFD I G I TA L FO R E N S I C SQuick InfoCOURSES OVERSEVERAL WEEKSFT SERIESDIGITAL FORENSICS: FAST TRACKThe Digital Forensics Fast Track program was developed to assistagencies in establishing or replenishing a cadre of digital forensicexaminers in a short period of time. Multiple weeks of instruction aredelivered at intervals of three to six weeks, allowing the students timeto apply what they have learned before returning for more advancedtraining.CLASSROOMLIVE ONLINEFC 099FINANCIAL CRIMEQuick InfoBLSSBASIC LEVEL SPREADSHEETING SKILLSThis course provides foundational spreadsheeting knowledge and skillsto enhance workplace productivity. The course covers basic navigationof Microsoft Excel by combining live demonstrations and hands-onexercises.1 DAYCLASSROOMLIVE ONLINEFC 101FINANCIAL CRIMEQuick Info3 DAYCLASSROOMLIVE ONLINE10FIPSFINANCIAL INVESTIGATIONS PRACTICALSKILLSThis course provides hands-on investigative training at a basic level.Students develop the practical skills, insight, and knowledge necessaryto manage a successful financial investigation from start to finish,including the acquisition and examination of financial records, interviewskills, and case management and organization. Additional topics includeforgery and embezzlement, financial exploitation of the elderly, workingwith spreadsheets, financial profiling, and state-specific statutes andlegal issues.

FC 102FINANCIAL CRIMEQuick Info1 DAYFITFINANCIAL INVESTIGATIONS TRIAGEThis course provides an overview of the actions investigators can takeat the outset of a financial crime investigation. Students learn to askcritical questions, gather documentation, and analyze information forleads. Topics include obtaining and working with financial records,interviewing witnesses and suspects, and investigative strategies fordifferent types of financial crimes.CLASSROOMLIVE ONLINEFC 105FINANCIAL CRIMEQuick Info3 DAYCLASSROOMFREAFINANCIAL RECORDS EXAMINATION ANDANALYSISThis course covers the acquisition, examination, and analysis of manytypes of financial records, including bank statements and checks, wiretransfer records, and business records. Topics include recognizingand investigating common indicators of fraud, using spreadsheets tofacilitate analysis and pattern recognition, and financial profiling. Thereis a strong focus on presenting financial evidence in multiple modalities:spreadsheet data outputs, graphic representations, and written/oralpresentations.LIVE ONLINEFC 110FINANCIAL CRIMEQuick Info2 DAYCLASSROOMFCASFINANCIAL CRIMES AGAINST SENIORSThis course promotes a multi-agency approach to the problemof financial exploitation of senior citizens. Bringing together lawenforcement personnel and adult protective services investigators,the course enhances students’ investigative skills and interviewingtechniques while facilitating networking and cooperation that canextend out of the classroom and into real cases. Topics includerecognizing elder abuse, working with victims, identifying perpetrators,and resources for investigation and community awareness. Studentswork together to conduct a mock investigation into a hypothetical case.LIVE ONLINE11

FC 111FINANCIAL CRIMEQuick Info1 DAYCLASSROOMLIVE ONLINEFC 122FINANCIAL CRIMEQuick Info1 DAYCLASSROOMFCSSFINANCIAL CRIMES AGAINST SENIORSSEMINARThis basic overview course promotes a multi-agency approach tothe problem of financial exploitation of senior citizens. Topics includeworking with senior victims, examining documents like bank recordsand power of attorney, and resources for investigation and communityawareness. Detailed examination of a case study from initial complaintto prosecution reinforces and illustrates the course content. With a dualfocus on financial abuse by trusted persons and common scams aimedat seniors, the course introduces senior-specific investigative skillswhile facilitating networking and cooperation that can extend out of theclassroom and into real cases.IPTTINTELLECTUAL PROPERTY THEFT TRAININGThis course introduces the problem of intellectual property (IP) theftand provides tools, techniques, and resources for investigating andprosecuting these crimes. A combination of lecture, discussion, andinteractive exercises illustrates the potential dangers and economicrepercussions of counterfeit products, as well as best practices andtechniques for investigating IP theft. Students are provided with relevantstatutes, sample organizational documents for IP investigations, andadditional resources for investigators and prosecutors.LIVE ONLINEFC 201FINANCIAL CRIMEQuick Info3 DAYCLASSROOMLIVE ONLINE12FRISFINANCIAL RECORDS INVESTIGATIVESKILLSThis course builds on the concepts introduced in FC 101 (FIPS) andFC 105 (FREA), introducing investigators and prosecutors to emergingissues in financial crime. Topics include money laundering, analyzinglarge financial data sets, conducting effective interviews, and managinglarge amounts of financial evidence. This course consists of a mixof lecture, discussion, and hands-on exercises. Students conduct amock investigation that includes interviews, data analysis, and theconstruction of an electronic case file.

FC 210FINANCIAL CRIMEQuick Info1/2 DAYMLCMONEY LAUNDERING & COMMINGLINGThis course provides basic to intermediate knowledge of the moneylaundering process and the commingling of funds. The course willprovide an understanding of the ingenuity criminals use to move andhide funds while concealing their identity. The course instruction will useexamples of real-life cases to provide an interactive session for students.CLASSROOMLIVE ONLINEIA 101I N T E L L I G E N C E A N A LY S I SQuick Info4 DAYCLASSROOMLIVE ONLINEIA 102I N T E L L I G E N C E A N A LY S I SQuick Info1 DAYFIATFOUNDATIONS OF INTELLIGENCE ANALYSISTRAININGThis course addresses the critical need for well-trained intelligence analyststo interpret growing amounts of information. This introductory course coversthe history and purpose of intelligence analysis, the intelligence cycle,analytical thinking skills, and the importance of strategic analysis. The coursewas developed by a consortium that included NW3C, the Law EnforcementIntelligence Unit (LEIU), the International Association of Law EnforcementIntelligence Analysts (IALEIA), and the Regional Information Sharing System(RISS). This course incorporates blended learning through online trainingmodules–IA 098 Introduction to Intelligence, IA 099 Basic Analyst Skills andRequirements, and IA 100 Policies and Guidance for Intelligence Analysts.This course has been certified by DHS/FEMA as course number WV-001-PREV.ILAINTRODUCTION TO LINK ANALYSISThis course provides in-depth instruction on Association and SocialNetwork Analysis. The first part of this course explains the purpose andprocess of association analysis and how to create an association matrix.Students will also learn how to build and present a link chart usingstandard symbols and terms. The second part of this course explainswhat social network analysis is with focus on types of centrality, networkstructure, and the application of the Target Centric approach.CLASSROOMLIVE ONLINE13

IA 103I N T E L L I G E N C E A N A LY S I SQuick Info1 DAYCLASSROOMISIAINTRODUCTION TO STRATEGIC INTELLIGENCEANALYSISThis course provides in-depth instruction on Association and SocialNetwork Analysis. The first part of this course explains the purpose andprocess of association analysis and how to create an association matrix.Students will also learn how to build and present a link chart usingstandard symbols and terms. The second part of this course explainswhat social network analysis is with focus on types of centrality, networkstructure, and the application of the Target Centric approach.LIVE ONLINEIA 105I N T E L L I G E N C E A N A LY S I SQuick Info3 DAYCLASSROOMLIVE ONLINEPT 201PROSECUTORSQuick Info2 DAYCLASSROOMLIVE ONLINE14IWABINTELLIGENCE WRITING AND BRIEFINGThis course covers basic intelligence writing and briefing principlesas well as methods to facilitate increased intelligence sharing. Topicsinclude creative/critical thinking and critical reading skills, sourceevaluation, privacy and civil rights, intelligence product writing structureand style, and creating and presenting intelligence briefings. Aninstructor and peer-feedback process is applied to the reports andbriefings produced in class.This course was originally developed in partnership with the U.S.Department of Homeland Security (DHS), the Federal EmergencyManagement Agency (FEMA), under the National Training and EducationDivision (NTED).DEBDIGITAL EVIDENCE BASICS & THE CLOUD ACTThis course provides the technical and legal information prosecutorsneed to see in cases involving digital evidence through the entirecriminal justice process, including seizure, extraction, admissibility,and verdict. Topics include digital evidence commonly seized duringthe execution of a search warrant, digital evidence stored remotely bythird-party service providers, and the processes investigators use toobtain this evidence (such as the interrogation of digital devices). Thereis a strong focus on case law and other legal issues surrounding thecollection and custody of digital evidence, as well as its use at trial.The course also examines new legislation like the CLOUD Act, whichis reforming the digital evidence landscape just as rapidly as the everchanging case law.

PT 230PROSECUTORSQuick Info1 DAYCLASSROOMMEPMOBILE EVIDENCE FOR PROSECUTORSThis course walks prosecutors through the mobile forensic process,providing crucial information that can help them work effectively withinvestigators and forensic examiners. The course is designed aroundthe legal issues involved with mobile forensics: from seizure of a device,to admissibility of evidence obtained from a forensic examination, toeffective testimony, to challenges commonly raised by defense counsel.Team taught by a mobile forensic examiner and an experiencedprosecutor, the course weaves technical and legal concepts together(including state-specific case law) in a format specifically designed forthe needs of prosecutors.LIVE ONLINECI 091C Y B E R I N V E S T I G AT I O N SQuick Info1/2 HOURITP-WBINTRODUCTION TO PREVIEWINGThis interactive online course provides an overview of the basic conceptsbehind secure previewing of digital devices in a forensically-soundmanner. Students become familiar with both on-site and off-site securepreviewing and learn to identify the two states in which a preview can beconducted (live-box and dead-box previewing). At the completion of thecourse, students will be able to recognize the recommended collectionorder of volatile data (the order of volatility).WEBCI 101C Y B E R I N V E S T I G AT I O N SQuick Info1/2 HOURUDF-WBUNDERSTANDING DIGITAL FOOTPRINTSThis online course introduces learners to the concept of digitalfootprints and best practices in protecting personally identifiableinformation (PII). Topics include limiting an individual’s digital footprint,protecting privacy on online social media, and the consequencesof oversharing personal information, as well as steps to take afterbecoming a target of doxing.WEB15

CI 103C Y B E R I N V E S T I G AT I O N SQuick Info1 HOURWEBCI 104C Y B E R I N V E S T I G AT I O N SQuick Info1/2 HOURICPI-WBINTRODUCTION TO CELL PHONEINVESTIGATIONSThis online course provides an overview of the two phases of a cellphone investigation: the preservation, extraction, and analysis of datawithin the phone, and the acquisition and analysis of data external tothe phone (call detail records and other information). Students becomefamiliar with several forensic tools currently in use in the field, includingNW3C’s PerpHound , a specialized tool that assists in plotting historicalcell site locations. Other topics include cell phone components, cellularnetwork components, and mobile device identification.VC-WBVIRTUAL CURRENCYThis online course covers basic information and concepts that serveas an introduction to virtual currencies and their relationship to othertypes of currency. It covers various types of virtual currency, includingthe difference between decentralized and centralized currencies, with astrong focus on Bitcoin what it is, how it is stored, and Bitcoin-specificinvestigative tips and techniques.WEBCI 106C Y B E R I N V E S T I G AT I O N SQuick Info1 HOURWEB16AI-WBAPPLE INTRODUCTIONThis online course provides the fundamental knowledge necessaryto identify different types of Apple hardware and to use the macOS operating system. Students learn what hardware devices are currentlyavailable from Apple including laptops, desktops, wireless hardware,and mobile devices. Students are also introduced to the macOSgraphical user interface and its four major components: Desktop,Finder, Menu Bar, and Dock.

CI 108C Y B E R I N V E S T I G AT I O N SQuick Info1 HOURWEBCI 111C Y B E R I N V E S T I G AT I O N SQuick Info1 HOURCS-WBCYBERSTALKINGThis online course provides information on what constitutes cyberstalkingin a legal context and information on handling cyberstalking complaints.Common elements of cyberstalking cases, potential tools and platformsused by cyberstalkers, and behavioral indicators are also covered in thiscourse. Developed with a victim-centered approach, this course providesinformation on establishing a relationship with victims to maximizetheir safety and further investigative efforts. The course concludeswith guidance on developing an investigative checklist and additionalresources available to law enforcement.DARK-WBTHE DARK WEB: AN INTRODUCTIONThis online course introduces the dark web and some of the mostpopular tools to access the darknet, including Tor, Freenet, and InvisibleInternet Project (I2P). Basic topics include what Tor is, how it works,and who uses it; as well as dark markets in Tor Hidden Service Servers(also known as .onion servers) and other hidden services. The courseconcludes with brief case studies covering some of the largest darkmarket seizures in history.WEBCI 131C Y B E R I N V E S T I G AT I O N SQuick Info1 1/2 HOURWEBISMN-WBINTRODUCTION TO SOCIAL MEDIA ANDNETWORKINGThis course introduces learners to the digital space known as socialmedia. It presents basic terminology used to describe how socialmedia and networking services are accessed, statistical data on usersand mobile devices, and a variety of popular services. This coursealso identifies and explains law enforcement uses of social media andnetworking services, the value of open source intelligence (OSINT),and important considerations such as social media policies, ethics, andprivacy issues associated with social media and networking services.17

CI 151C Y B E R I N V E S T I G AT I O N SQuick Info1 HOURWEBCI 152C Y B E R I N V E S T I G AT I O N SQuick Info1 HOURWEBCI 153C Y B E R I N V E S T I G AT I O N SQuick Info1 HOURWEB18LC1-WBFIRST RESPONDERS & DIGITAL EVIDENCEThis online course provides basic information for first responders whomay encounter digital evidence in the course of their duties. Topicsinclude the definition of digital evidence, where it can be found, theimportance of getting digital devices to a forensics expert, and theways in which digital evidence can be compromised. This course alsoaddresses the issue of when a warrant is required to seize and/orsearch digital devices.This course is part of the training series Legal Concerns for DigitalEvidence Responders. It can be completed as a stand-alone course orin combination with the other courses.LC2-WBSEARCH WARRANTS & DIGITAL EVIDENCEThis online course provides information on obtaining and executingsearch warrants in cases involving digital evidence, with a focus on thesimilarities and differences between these and other search warrants.The course covers establishing probable cause, particularity, scope,and nexus; the

personnel need to safely and methodically collect and preserve digital evidence at a crime scene in a forensically-sound manner. Topics include recognizing potential sources of digital evidence; planning and executing a digital evidence-based seizure; and the preservation, collection, documentation, and transfer of digital evidence. LIVE ONLINE

Related Documents:

mfi: 30% limits 13300 17420 21960 26500 31040 35580 39350 41850. alabama 1 person 2 person 3 person 4 person 5 person 6 person 7 person 8 person state hud income guidelines - effective----- a d j u s t e d i n

This chart is provided as a guide only. You are responsible to ensure the accuracy of the numbers. MAXIMUM INCOME BY HOUSEHOLD/MAXIMUM RENTS LIMITS BRIDGEPORT HMFA For use by ALL developments in this Federal Statistical Area (FY2022) INCOME LIMITS 1 person 2 person 3 person 4 person 5 person 6 person 7 person 8 person

FM7725 team navy blue/white FQ1459 black/white FQ1466 team maroon/white FQ1471 team dark green/white FQ1475 team royal blue/white FQ1478 team power red/white GC7761 grey five/white FM4017 06/01/21 FQ1384 06/01/21 FQ1395 06/01/21 UNDER THE LIGHTS BOMBER 75.00 S20TRW505 Sizes: L,M,S,2XL,2XLT,3XLT,LT,MT,XL,XLT,XS FM4017 team navy blue/white .

1. Write down three facts about the white rhinoceros. 1. The white rhinoceros is the largest living species of rhinoceros. 2. There are two types of white rhinoceros: the northern white rhinoceros and the southern white rhinoceros. 3. The white rhinoceros is one of the largest and heaviest land animals. 2. Explain the term endangered species.

White Mountain National Forest. For more information please refer to the White Mountain National Forest website or contact: White Mountain National Forest 71 White Mountain Drive Campton NH 03223 (603) 536-6100 Sources: DeGraaf, R., M., M. Yamasaki, W.B. Leak, and A.M. Lester. 2005. Landowner's Guide to Wildlife Habitat;

c. Third person 2. He likes to tell jokes that make everybody laugh. a. First person b. Second person c. Third person 3. Mike took his book to the library to renew it for one more week. a. First person b. Second person c. Third person 4. My grandma is coming to visit and I can’t wait to see her. a. First pe

208 ISSN 1916-4742 E-ISSN 1916-4750 white hair, and white day’; all these positive terms indicate the meaning of white in their cultural experiences as: i. white hand Generous, kind and humanitarian. ii. white heart Kind and honest. iii. white eye Blind, meaning the person being addressed is blind.

White A2530 - M Snow White A1044 - M White Linen A3035 - M Frosty Dawn A1030 - M Gentle Grey A1128 - M Coastal Fog A1129 - M Grey Feather A1103 - M Murky Shadow A2240 - M Brown A1126 - M White Cotton A1104 - M Zephyr A1127 - M Virginal White A2053 - M Serene White A2017 - M Glow White A2043 - M