Search Results

5 offerings found

Delivery Mode



Training Categories











Training Programs
Audience
Cost
ICAC/iKeepSafe Incident Response Tool for Schools
ICAC/iKeepSafe Incident Response Tool for Schools
Webinar

Join us to learn about the new ICAC/iKeepSafe Incident Response Tool (IRT) for schools. You can help prevent and address technology related incidents by building a cooperative relationship with schools. This free resource helps schools with the steps of incident management, such as fact-finding, documentation, reporting and engaging the appropriate school officials and other stakeholders. Through collaboration with law enforcement and the use of this tool, schools can plan and prepare an effective and appropriate response to all types of technology related incidents, including cyberbullying, sexting, hacking, and threats of violence.

Aug 23, 2018 | 2:00 PM -3:30 PM ET
No Fee
More Info about this training Aug 23, 2018 | 2:00 PM -3:30 PM ET
Criminal Connections: Child Pornography and Child Sexual Abuse
Criminal Connections: Child Pornography and Child Sexual Abuse
Classroom

Many offenders who sexually abuse children also possess child pornography. In 2012, over 80% of men arrested for child sexual abuse were in possession of child pornography, with 60% having pornographic images or video of children under the age of five. In 2015, 25 million child sexual abuse files were reviewed by NCMEC, up from 450,000 in 2004. Offenders may use child pornography to groom or control their victims and may manufacture it to memorialize the event for later gratification. During this training, you will learn about the additional trauma victims experience when child pornography is involved. Explore investigative strategies that address the relationship between child sexual abuse and child pornography to supplement an investigation and corroborate victim statements. Gather the right tools and resources to investigate sexual abuse cases and produce the most comprehensive case outcomes.

Digital Evidence Investigations
Digital Evidence Investigations
Classroom

Improve capabilities to conduct digital evidence preservation, collection, and analysis. Understand the role this type of digital evidence plays in child abduction, exploitation, and child sex trafficking cases.

Technology Dangers and Risk for Youth
Technology Dangers and Risk for Youth
Classroom

Learn about the risks technology poses to youth surrounding sexual exploitation and abuse cases. Examine different types of offenders and the technology used to victimize children. Uncover social networking sites and applications used by children and offenders. Identify cyberbullying and prevention methods including sexting and its legal ramifications. Gather information on child trafficking including: grooming process, examination of online advertisements and where to find them, initial recruiting techniques, and, how different cultural heritage and gang influence impacts victimization.

Technology Facilitated Crimes Against Children
Technology Facilitated Crimes Against Children
Classroom

Learn about how technology is used to target and exploit children. Identify the dangers and impact child pornography has on its victims and examine offender characteristics and their use of technology. Review the various types of technology used for sexual exploitation and the challenges that technology creates. Learn about the effects of sexual abuse on victims.

REQUEST TRAINING

Need custom training to address your unique needs?
We can help.


LET'S GET STARTED!

JOIN OUR MAILING LIST

Subscribe now to get the latest training news FIRST

SIGN ME UP!
Psychology of School Threat Assessments