Search Results

5 offerings found

Delivery Mode



Training Categories











Training Programs
Audience
Cost
Criminal Connections: Child Pornography and Child Sexual Abuse
Criminal Connections: Child Pornography and Child Sexual Abuse
Classroom

Many offenders who sexually abuse children also possess child pornography. In 2012, over 80% of men arrested for child sexual abuse were in possession of child pornography, with 60% having pornographic images or video of children under the age of five. During this training, you will learn about the additional trauma victims experience when child pornography is involved. Explore investigative strategies that address the relationship between child sexual abuse and child pornography to supplement an investigation and corroborate victim statements. Gather the right tools and resources to investigate sexual abuse cases and produce the most comprehensive case outcomes.

Digital Evidence Investigations
Digital Evidence Investigations
Classroom

Improve capabilities to conduct digital evidence preservation, collection, and analysis. Understand the role this type of digital evidence plays in child abduction, exploitation, and child sex trafficking cases.

Protecting Children in a Digital Age
Protecting Children in a Digital Age
Classroom

Learn about the risks technology poses to youth surrounding sexual exploitation and abuse cases. Examine types of offenders and the technology used to victimize children. Uncover social networking sites and applications used by children and offenders. Identify cyberbullying and prevention methods including sexting and legal ramifications. Gather information on child trafficking including: grooming process, examination of online advertisements and where to find them, initial recruiting techniques, and how different cultural heritage and gang influence impacts victimization.

Technology Dangers and Risk for Youth
Technology Dangers and Risk for Youth
Classroom

Learn about the risks technology poses to youth surrounding sexual exploitation and abuse cases. Examine different types of offenders and the technology used to victimize children. Uncover social networking sites and applications used by children and offenders. Identify cyberbullying and prevention methods including sexting and its legal ramifications. Gather information on child trafficking including: grooming process, examination of online advertisements and where to find them, initial recruiting techniques, and, how different cultural heritage and gang influence impacts victimization.

Technology Facilitated Crimes Against Children
Technology Facilitated Crimes Against Children
Classroom

Learn about how technology is used to target and exploit children. Identify the dangers and impact child pornography has on its victims and examine offender characteristics and their use of technology. Review the various types of technology used for sexual exploitation and the challenges that technology creates. Learn about the effects of sexual abuse on victims.

REQUEST TRAINING

Need custom training to address your unique needs?
We can help.


LET'S GET STARTED!

JOIN OUR MAILING LIST

Subscribe now to get the latest training news FIRST

SIGN ME UP!
Managing the Media