Location: Alabama Location: Arkansas Location: Arizona Location: California Location: Colorado Location: Florida Location: Louisiana Location: Massachusetts Location: Maryland Location: New Jersey Location: Nevada Location: Ohio Location: Oregon Location: Pennsylvania Location: South Carolina Location: Tennessee Location: Texas Location: Utah Location: Washington Location: Wisconsin Location: Wyoming Delivery Modes: Classroom Delivery Modes: Conference Delivery Modes: Live Online Instructor Led Delivery Modes: Self-Paced Delivery Modes: Webinar (Exclusive Content) Delivery Modes: Webinar (Upcoming) Delivery Modes: Webinar (Watch Now) Program: AMBER Alert in Indian Country Program: AMBER Alert Training & Technical Assistance Program: Contract with Us -Tribal Communities Program: Critical 3 Videos Program: Emmett Till Cold Case Program Program: Internet Crimes Against Children Task Force Program: Internet of Things (IoT) TTA Program: Missing and Exploited Children TTA Program Program: Missing Children's Day Program: NCJTC Contracting Program: Strengthening Community Relations Program: TCRP for Missing Indigenous Persons TTA Program: Tell Us Your Story Program: TPA training Program: Traffic Safety Program: Tribal Community Corrections Program: Tribal Justice Systems Planning Program: Tribal Responses to Alcohol and Substance Misuse Program: Verbal De-Escalation Training Center Audience: Corrections/Probation/Parole Audience: Educator Audience: Emergency Management Audience: Fire/EMS Audience: Judge/Court Personnel Audience: Law Enforcement Professional Audience: Law Enforcement Support Audience: Legal Audience: Social/Child Services Audience: Tribes/Tribal Partners Audience: Victim Advocate/Victim Services Category: Alcohol and Substance Misuse Category: Child Abuse and Neglect Category: Child Sex Trafficking Category: Community Policing and Prevention Category: Courts and Community Corrections Category: Death Investigations Category: Endangered, Missing, and Abducted Children Category: Leadership, Management, and Planning Category: School Safety Category: Sex Offender Management Category: Technology Investigations Category: Victims and At-Risk Populations Clear all
Child Sex Trafficking: From Suspicion to Disclosure
Child Sex Trafficking: From Suspicion to Disclosure
Live Online Instructor Led

Learn basic techniques and strategies to enhance the likelihood of obtaining information from possible victims of child sex trafficking. Compare and contrast typical child sexual abuse cases with child sex trafficking (CST) cases and address the different points of entry into the criminal justice and welfare system for CST victims. Understand various disciplines' roles and responsibilities and how they can contribute to a positive outcome of the CST case. Examine question strategy, interview dynamics, language use, and interview suggestions. Discuss the business model of child sex trafficking as it relates to a variety of crimes, including the use of child sexual abuse material (CSAM).

Following the Evidence in Child Abuse and Child Exploitation Cases
Following the Evidence in Child Abuse and Child Exploitation Cases
Live Online Instructor Led

Examine the importance of multidisciplinary team (MDT) case coordination and evidence corroboration in the investigation of child abuse cases. Various members of the Multidisciplinary Team, such as law enforcement, child protective services, and forensic interviewers may gather different or differing information. Learn how to evaluate evidentiary findings through crime scene images, interviews and case studies. Understand multidisciplinary team members' roles and responsibilities for protecting child victims and prosecuting offenders. Focus on offenders’ use of technology, including the use of child sexual abuse material (CSAM) in grooming and manipulation. Discuss a variety of technology that can be used by investigators.

Investigative Considerations with iPhone® and Other iOS® Devices
Investigative Considerations with iPhone® and Other iOS® Devices
Live Online Instructor Led

This training provides participants with essential guidance on identifying critical iPhone® data before a forensic examination. Participants will explore key usage data, search functions, Stolen Device Protection, Screen Time, synced passwords, and learn how Apple Watch® evidence can play a pivotal role in investigations.

Creating a Community Action Plan for the Prevention of Child Sexual Abuse
Creating a Community Action Plan for the Prevention of Child Sexual Abuse
Live Online Instructor Led

Join other child-serving professionals to create a plan of action for preventing child sexual abuse of youth in your care. Learn the signs and symptoms of child sexual abuse, mandated reporter and stakeholder responsibilities. Identify strengths and weaknesses of current prevention practices, and develop an action plan, using the Strategic Prevention Dashboard, for your organization. This course is open to all members of child serving organizations such as preschool, after-school care, summer camps, church groups, athletic associations or others responsible for the care of minors.

National Missing and Unidentified Persons Conference
National Missing and Unidentified Persons Conference
Conference

Join us at this national conference, which focuses on identifying innovative and effective technologies, approaches and strategies in the search, investigation, identification, recovery, and reunification of missing persons, regardless of the circumstances surrounding their disappearance. You will gain knowledge and proficiency in evidence-based, state-of-the-art, and collaborative solutions, and explore tools and techniques from the initial response through recovery and resolution, vital to the missing and their families. The conference will also examine the complex and multifaceted nature of missing person cases and the unique needs of vulnerable population groups such as aging individuals, persons with differing abilities, indigenous/native populations, victims of trafficking, veterans and active military, transient populations, and others.

Investigations of Android® Devices & the Google Ecosystem
Investigations of Android® Devices & the Google Ecosystem
Live Online Instructor Led

This training prepares participants to identify critical data on Android® devices before a forensic examination. Participants will learn what to collect beyond photos, text messages, and apps, including usage data and system artifacts. The course also explores how Google® accounts and cloud-stored information integrate with Android devices to support investigative efforts.

Fire and Explosion Related Death Investigations
Fire and Explosion Related Death Investigations
Classroom

Join other investigators to gather new information and tools for investigating fire and explosion related deaths. Examine the principles of fire behaviors, areas of focus in fire related deaths, working with the medical examiner’s office and evidence/scene safety considerations.

Verbal De-Escalation and Conflict Resolution
Verbal De-Escalation and Conflict Resolution
Live Online Instructor Led

Avoid potential conflict both professionally and personally by learning to organize your thinking and respond calmly. Consider the approaches you can take to prevent and respond to verbal conflict. This course will explore the communication process, conflict prevention, to help you understand why conflicts occur. Instruction will also cover certain circumstances in which verbal de-escalation techniques may not be appropriate, and provide techniques to resolve such conflicts. Join us to learn how de-escalation techniques and communication skills can potentially defuse tense situations and lead to more successful outcomes. This training does not cover physical intervention techniques.

Responding to Sextortion Related Offenses Against Children
Responding to Sextortion Related Offenses Against Children
Live Online Instructor Led

Sextortion using technology is an increasing trend seen by law enforcement. Sextortion refers to the crime where someone employs an abuse of power, usually a threat to expose explicit images, in order to coerce a person to do something. This 1-day training will identify the methods and tactics used by offenders, and describe why youth are vulnerable to these tactics. The training will explain the long-term impact of these crimes on victims, offer a victim-centered response, and provide information on reporting these crimes to law enforcement, the National Center for Missing and Exploited Children and the electronic service provider(s). This course will conclude with identifying effective Sextortion prevention messages for youth, parents and educators.

Suspicious Death Investigations: Finding the Right, Eliminating the Wrong, and Avoiding the Undetermined
Suspicious Death Investigations: Finding the Right, Eliminating the Wrong, and Avoiding the Undetermined
Classroom

Examine suspicious death case studies based on the experiences of a homicide detective and forensic pathologist. Identify key scene findings, review actual cases and correlate these findings to the autopsy results. This course will discuss improving case outcomes through strong relationships between investigating agencies and the medical examiner’s office. Students will gain appreciation of how unique case features can affect the direction of the investigation. The ultimate resolution of each case examined will be considered and applied lessons learned are shared during the course.

 
Loading Spinner