Skip to main content

Training Delivery - Online Training

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20250205-140229-69

Submitted by Bryan Lee Dail on
What has not changed on the motor vehicle in over 125 years? If you answered, "The stamped metal license plate" you are correct! The digital license plate (DLP) of today can do so much more, and you can learn all about it on as we break down this new technology. Digital license plates are here with an array of features, including GPS, Bluetooth, RFID (radio frequency identification) and a cellular modem.

20250205-140226-63

Submitted by Bryan Lee Dail on
Have you ever wondered how the forensic tools you use, know what they do? Have you ever wondered what an artifact means and why the 0 indicates a call was missed? Join NW3C High-Tech Crime Specialist Chris Atha as he introduces how to find these answers. Chris will break down the basics of setting up a mobile test device and performing basic differential testing using an iOS device. These steps will be performed using various free and open source tools, which students can use to follow along.

20250205-140224-37

Submitted by Bryan Lee Dail on
The first module of this course covers fundamentals such as recognizing computer components and their functions, accessing computer firmware, and the startup and shutdown processes. The second module covers how a hard disk drive works, how data is converted into digital information, how to calculate the storage capacity of a device, partitioning and how that is used for storage, and how a solid state hard drive functions.

20250205-140221-67

Submitted by Bryan Lee Dail on
This course provides an introduction to data encryption, covering the purpose of encryption as well as the process of encrypting data, and clarifying the distinctions between encryption and other operations like password protection and encoding. It explores the confusion, diffusion, and secret key encryption methods. Topics include detecting encryption (including recognition of some of the most popular types of encryption software), as well as proper procedures for law enforcement professionals who detect that encryption may be present on a device.

20250205-140218-68

Submitted by Bryan Lee Dail on
The Public Safety Threat Alliance Intelligence team will present our observations and assessments on the trends and developments of cyber activity targeting public safety. We will breakdown the specific tradecraft mapped to the MITRE ATT&CK matrix, and detail how threat actors have been adapting to continue to be successful in 2023. Presented by: Tyler Brodbeck, Threat Intelligence Manager, Motorola Solutions Travis Randall, Senior Threat Intelligence Analyst, Motorola Solutions

20250205-140215-05

Submitted by Bryan Lee Dail on
By the year 2025, it is expected that there will be over 45 billion connected devices around the world that is 9.27 connected devices per person. The Internet of Things (IoT) utilizes a variety of communication standards and a unique set of networking protocols to connect these devices. This webinar will explore these unique IoT networking protocols along with their varied IoT topography and explain IoT network interrogation techniques to be used in an investigation.

20250205-140146-79

Submitted by Bryan Lee Dail on
Is information from mobile extractions, Cloud Source and Google Timeline a solid piece of evidence? In this webinar, we will see how to make your digital evidence become a strong basis for courtroom testimony when validated with phone records, cell coverage, and other sources.

20250205-140143-56

Submitted by Bryan Lee Dail on
This introductory course familiarizes participants with illegal darknet markets and associated forums, particularly the illicit goods and services offered, as well as successful law enforcement operations targeting these sites. Participants will gain practical knowledge on how to create anonymous accounts to access and monitor these sites and intelligence collection tactics for use in law enforcement investigations.

20250205-140140-05

Submitted by Bryan Lee Dail on
This webinar introduces participants to illegal darknet markets and associated forums, particularly the illicit goods and services offered, as well as successful law enforcement operations targeting these sites. Participants will gain practical knowledge on how to create anonymous accounts to access and monitor these sites and intelligence collection tactics for use in law enforcement investigations.

20250205-140137-96

Submitted by Bryan Lee Dail on
Cybercrimes can and have been committed by organized criminal groups. This webinar introduces participants to the notion of cyber organized crime, the cyber-dependent and cyber-enabled crimes committed by organized criminal groups, the structure and organization of cyber organized criminal groups and roles of members within these groups, and the tools used by these groups. The clearnet and darknet spaces where these groups operate will also be explored.
Subscribe to Training Delivery - Online Training