Location: Alabama Location: Arkansas Location: Arizona Location: California Location: Colorado Location: Florida Location: Louisiana Location: Massachusetts Location: Maryland Location: New Jersey Location: Nevada Location: Ohio Location: Oregon Location: Pennsylvania Location: South Carolina Location: Tennessee Location: Texas Location: Utah Location: Washington Location: Wisconsin Location: Wyoming Delivery Modes: Classroom Delivery Modes: Conference Delivery Modes: Live Online Instructor Led Delivery Modes: Self-Paced Delivery Modes: Webinar (Exclusive Content) Delivery Modes: Webinar (Upcoming) Delivery Modes: Webinar (Watch Now) Program: AMBER Alert in Indian Country Program: AMBER Alert Training & Technical Assistance Program: Contract with Us -Tribal Communities Program: Critical 3 Videos Program: Emmett Till Cold Case Program Program: Internet Crimes Against Children Task Force Program: Internet of Things (IoT) TTA Program: Missing and Exploited Children TTA Program Program: Missing Children's Day Program: NCJTC Contracting Program: Strengthening Community Relations Program: TCRP for Missing Indigenous Persons TTA Program: Tell Us Your Story Program: TPA training Program: Traffic Safety Program: Tribal Community Corrections Program: Tribal Justice Systems Planning Program: Tribal Responses to Alcohol and Substance Misuse Program: Verbal De-Escalation Training Center Audience: Corrections/Probation/Parole Audience: Educator Audience: Emergency Management Audience: Fire/EMS Audience: Judge/Court Personnel Audience: Law Enforcement Professional Audience: Law Enforcement Support Audience: Legal Audience: Social/Child Services Audience: Tribes/Tribal Partners Audience: Victim Advocate/Victim Services Category: Alcohol and Substance Misuse Category: Child Abuse and Neglect Category: Child Sex Trafficking Category: Community Policing and Prevention Category: Courts and Community Corrections Category: Death Investigations Category: Endangered, Missing, and Abducted Children Category: Leadership, Management, and Planning Category: School Safety Category: Sex Offender Management Category: Technology Investigations Category: Victims and At-Risk Populations Clear all
Investigative Considerations with iPhone® and Other iOS® Devices
Investigative Considerations with iPhone® and Other iOS® Devices
Live Online Instructor Led

This training provides participants with essential guidance on identifying critical iPhone® data before a forensic examination. Participants will explore key usage data, search functions, Stolen Device Protection, Screen Time, synced passwords, and learn how Apple Watch® evidence can play a pivotal role in investigations.

Beyond Google - Discovering Online Resources in Investigations
Beyond Google - Discovering Online Resources in Investigations
Classroom

In the modern cyber-world, almost all criminal investigations have an online aspect that can be used to further investigations and more quickly solve otherwise difficult cases. Join us to examine open source online intelligence/information and learn how to leverage free platforms, databases, and web applications to strengthen criminal cases. Uncover little known facts and techniques to optimize results using online search engines and online internet resources, which will support your investigations and prosecutions. Learn how to complete and serve search warrants for a variety of electronic information and databases to further all types of investigations. Develop new skill sets to establish contacts and open-source intelligence networks to provide ongoing criminal and threat intelligence in your jurisdiction.

Investigations of Android® Devices & the Google Ecosystem
Investigations of Android® Devices & the Google Ecosystem
Live Online Instructor Led

This training prepares participants to identify critical data on Android® devices before a forensic examination. Participants will learn what to collect beyond photos, text messages, and apps, including usage data and system artifacts. The course also explores how Google® accounts and cloud-stored information integrate with Android devices to support investigative efforts.

Internet of Things: Criminal Investigation Considerations
Internet of Things: Criminal Investigation Considerations
Live Online Instructor Led

The Internet of Things (IoT) involves a web of data which requires planning to access and manage. During this training, we will explore devices and their connected systems, to understand how they create valuable evidence and could have significance at crime scenes. Examination through live demonstrations on how to retrieve and review the data, identify applicable Fourth Amendment concepts, and apply them to build a legally defensible and ethical case will be discussed.

Internet of Things: Privacy Concerns: What Communities Need to Know
Internet of Things: Privacy Concerns: What Communities Need to Know
Live Online Instructor Led

As the Internet of Things (IoT) becomes ubiquitous in our everyday lives there are privacy and security concerns that citizens should be aware of. This training will provide an overview of IoT and will teach law enforcement officials methods to engage with their communities to provide information about IoT privacy and security. Steps that community members can take to be safer with these devices, and effective teaching strategies regarding prevention will be covered.

Mobile Device Investigations
Mobile Device Investigations
Classroom

Learn current cell phone related strategies and techniques for any type of investigation. Explore and apply current practices for working with different cellular network providers, completing technology-focused search warrants, analyzing cellular provider call data, associating reported data to the investigation and effective case reporting strategies.

Protecting Children in a Digital Age
Protecting Children in a Digital Age
Live Online Instructor Led

Technology plays a tremendous role in our children's lives. Learn about the ways children are interacting online to create better understanding and open up meaningful communication. Increase awareness of opportunities to protect and connect with children while also gathering valuable information to mitigate threats posed by individuals who seek to exploit them.

Casting the Digital Footprint
Casting the Digital Footprint
Classroom

Technology impacts almost every type of investigation today. Uncover the information technology users knowingly and unknowingly leave behind when accessing and using electronic devices. Learn how to covertly strengthen your investigations through gathering personal, public and open source data. Discuss techniques to locate evidence through technologies that can benefit any type of investigation.

Criminal Connections: Child Exploitation Material and Child Sexual Abuse
Criminal Connections: Child Exploitation Material and Child Sexual Abuse
Classroom

Explore investigative strategies that address the relationship between child sexual abuse and child sexual abuse materials (child pornography) to supplement an investigation and corroborate victim statements. Gather new tools and resources for the most comprehensive case outcomes.

Connected Clues: An Introduction to IoT for Criminal Investigators
Connected Clues: An Introduction to IoT for Criminal Investigators
Self-Paced

Explore the fundamentals of the Internet of Things (IoT) and its growing role in modern criminal investigations through this self-paced training. The course introduces investigators to how connected devices generate critical digital evidence, explains common types of IoT data, and highlights practical considerations for identifying, collecting, and preserving IoT-based evidence during an investigation.

 
Loading Spinner