Improve capabilities to conduct digital evidence preservation, collection, and analysis. Understand the role this type of digital evidence plays in child abduction, exploitation, and child sex trafficking cases.
Learn about the risks technology poses to youth surrounding sexual exploitation and abuse cases. Examine different types of offenders and the technology used to victimize children. Uncover social networking sites and applications used by children and offenders. Identify cyberbullying and prevention methods including sexting and its legal ramifications. Gather information on child trafficking including: grooming process, examination of online advertisements and where to find them, initial recruiting techniques, and, how different cultural heritage and gang influence impacts victimization.
Learn about the differences between child pornography and child sexual assault. Examine offender characteristics and the appeal of technology. Review the various types of technology used for sexual exploitation and to facilitate crimes against children. Discuss how offenders utilize various technology, and the challenges that new technology creates. Learn about the effects of sexual abuse on victims.
Need custom training to address your unique needs?
We can help.
Please fill out all required fields.
Our dedicated NCJTC staff will contact you within 2 business days of receipt of this request to discuss your needs and how we can help. We appreciate your interest in our training programs and look forward to serving you.
For questions, contact us at (855) 866-2582 or at email@example.com.
Subscribe now to get the latest training news FIRST