Skip to main content

Training Delivery - Classroom Training/Onsite

Attention

The TTA Reporting Portal is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

NLERSP Executive Course (In-Person, Abbreviated) - Georgia Chiefs of Police Summer Training Conference

Abbreviated NLERSP Executive Workshop provided as part of the Georgia Chiefs of Police Summer Training Conference. Lead your agency in roadway safety. Attend this 2-hour workshop with other mid-level and executive-level officers where you will discuss policies, training, and technological innovations that can reduce the risk of officer-involved collisions and struck-by incidents.

DF201 Intermediate Digital Forensic Analysis: Automated Forensic Tools

This course provides students with the fundamental knowledge and skills necessary to perform a limited digital forensic examination, validate hardware and software tools, and effectively use digital forensic suites and specialized tools. The course begins with a detailed study of the digital forensic examination process, including documentation, case management, evidence handling, validation, and virtualization. Students learn to use today's leading commercial and open source digital forensic suites: Magnet Axiom, X-ways Forensic, and Autopsy. Instruction on each suite will include an interface overview, configuration, hashing, file signature analysis, keyword searching, data carving, bookmarking, and report creation.

*Digital forensic process. Evidence review; requests for examination; case management.
*Validation. Creation of validation images; validation testing.
*Effective tool usage. Tool interface; hashing; file signature analysis; data carving; searching; metadata; bookmarking.
*Reporting. General report structure; report templates; using tool-generated reports.

DF310 Advanced Digital Forensic Analysis: Windows

This course covers the identification and extraction of artifacts associated with the Microsoft Windows operating system. Topics include the Change Journal, BitLocker, and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs, Volume Shadow Copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

Casting the Digital Footprint

Technology impacts almost every type of investigation today. Uncover the information technology users knowingly and unknowingly leave behind when accessing and using electronic devices. Learn how to covertly strengthen your investigations through gathering personal, public, and open source data. Discuss techniques to locate evidence through technologies that can benefit any type of investigation. 

Casting the Digital Footprint

Technology impacts almost every type of investigation today. Uncover the information technology users knowingly and unknowingly leave behind when accessing and using electronic devices. Learn how to covertly strengthen your investigations through gathering personal, public, and open source data. Discuss techniques to locate evidence through technologies that can benefit any type of investigation.

Training: Mid-Level Leadership Workshop: Fostering an Organizational Culture of Safety and Wellness

This VALOR workshop inspires mid-level law enforcement leaders to advance officer safety and wellness strategies within their own agencies.

This one-day workshop is a subject expert-facilitated event that:

  • Addresses leadership strategies.
  • Examines causes of officer assaults, injuries, and deaths.
  • Explores critical officer wellness issues.
  • Discusses protocols and best practices.
  • Discusses setting a safety precedent and accountability.
  • Illustrates actionable opportunities to increase safety and wellness.

 

FC122 Intellectual Property Theft Training (May 2020, Pennsylvania)

This course introduces the problem of intellectual property (IP) theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific workbook that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

Subscribe to Training Delivery - Classroom Training/Onsite