DF099 How Computers Work and Store Data

Provider: National White Collar Crime Center (NW3C)

Target Audience: Investigators, Officers

Topic Area: Cyber Forensics, Cyber Investigations, Cyber Security, high tech crimes, investigations

Event Type: Training

Delivery Method: Online

HDS2-WB

The first module of this course covers fundamentals such as recognizing computer components and their functions, accessing computer firmware, and the startup and shutdown processes. The second module covers how a hard disk drive works, how data is converted into digital information, how to calculate the storage capacity of a device, partitioning and how that is used for storage, and how a solid state hard drive functions.

 » Read more


Click here for more information

DF091 Encryption

Provider: National White Collar Crime Center (NW3C)

Target Audience: Investigators, Officers

Topic Area: Cyber Forensics, Cyber Investigations, Cyber Security, high tech crimes, investigations, IT Security

Event Type: Training

Delivery Method: Online

ENC2-WB

This course provides an introduction to data encryption, covering the purpose of encryption as well as the process of encrypting data, and clarifying the distinctions between encryption and other operations like password protection and encoding. It explores the confusion, diffusion, and secret key encryption methods. Topics include detecting encryption (including recognition of some of the most popular types of encryption software), as well as proper procedures for law enforcement professionals who detect that encryption may be present on a device.

 » Read more


Click here for more information

CS103 Digital Trust

Provider: National White Collar Crime Center (NW3C)

Target Audience: Investigators, Officers

Topic Area: Cyber Forensics, Cyber Investigations, Cyber Security, high tech crimes, investigations, IT Security

Event Type: Training

Delivery Method: Online

DT-WB

Trust is an essential component for reducing friction between people, organizations, government, and other entities. When trust is high, people are more willing to cooperate, require less assurances for doing so, and are less skeptical of the outcomes. Unfortunately, today’s climate of manipulated media, deep fakes, conflicting sources of information, and sensationalized news has raised many people’s level of skepticism. This makes building and maintaining trust particularly difficult but also incredibly important. This course will provide an overview of factors that contribute to public trust in law enforcement’s use of current and emerging digital technologies.

 » Read more


Click here for more information

CI155 Online Undercover

Provider: National White Collar Crime Center (NW3C)

Target Audience: Investigators, Officers

Topic Area: Cyber Forensics, Cyber Investigations, high tech crimes, investigations, Training

Event Type: Training

Delivery Method: Online

LC5-WB

This course provides a legal overview of what investigators are and are not permitted to do while conducting online undercover investigations. Topics include terms of service, entrapment and outrageous government misconduct, and wiretapping law as it relates to the recording and documenting of online activities. This course also covers defense strategies commonly used to counter online undercover investigations.

 » Read more


Click here for more information

CI132 OSINT Module 1: Advanced Search Engine Techniques

Provider: National White Collar Crime Center (NW3C)

Target Audience: Chiefs, Investigators, Officers, Prosecutors

Topic Area: Cyber Forensics, Cyber Investigations, Cyber Security, high tech crimes, investigations, IT Security, Training

Event Type: Training

Delivery Method: Online

ASET-WB

This course focuses on practical online search techniques. Students will learn about using the advanced features of popular search engines, accessing cached versions of websites, searching with images, and common signs of fake and manipulated images. This course is part of the Open Source Intelligence Modules. It can be completed as a stand-alone course or in combination with the other courses.

 » Read more


Click here for more information

CI106 Ransomware: An Introduction

Provider: National White Collar Crime Center (NW3C)

Target Audience: Investigators, Officers, Prosecutors

Topic Area: Cyber Forensics, Cyber Investigations, Cyber Security, high tech crimes, investigations, IT Security

Event Type: Training

Delivery Method: Online

ITR-WB

According to the FBI’s Internet Crime Complaint Center (IC3), ransomware attacks lead to several billion dollars lost each year. Law enforcement officers should know how to respond to and protect their agencies and communities from these attacks. This interactive module teaches participants how to recognize and respond to a ransomware attack and discusses how ransomware can affect devices and networks and how to prevent ransomware attacks.

 » Read more


Click here for more information

CI105 Preservation Letters: Their Vital Role in Investigations

Provider: National White Collar Crime Center (NW3C)

Target Audience: Investigators, Officers, Prosecutors

Topic Area: Cyber Forensics, Cyber Investigations, high tech crimes, investigations

Event Type: Training

Delivery Method: Online

PL-WB

With the rise of electronic evidence and the likelihood that the crimes you’re investigating are conducted with or supported by the use of mobile devices, the Internet, or cloud-based applications, preservation letters provide a means to prevent the destruction of electronic records and buy an investigator time to retrieve and analyze potential evidence.

 » Read more


Click here for more information

CI101 Understanding Digital Footprints

Provider: National White Collar Crime Center (NW3C)

Target Audience: Investigators, Officers

Topic Area: Cyber Forensics, Cyber Investigations, high tech crimes, investigations

Event Type: Training

Delivery Method: Online

UDF2-WB

This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information (PII). Topics include limiting an individual’s digital footprint, protecting privacy on social media, opting out of data aggregator sites, and the consequences of oversharing personal information; as well as steps to take after becoming a target of doxing.

 » Read more


Click here for more information

Northwest Regional ICAC Conference

Provider: ICAC

Topic Area: Cyber Forensics, Cyber Investigations, Cyber Security, high tech crimes, IT Security

Event Type: Conference

Delivery Method: Conference

When: October 2-6, 2023

Where: Redmond, WA

Washington State ICAC Task Force, in partnership with Microsoft, will be hosting the 9th annual NW ICAC & Technology Conference, at the Microsoft Campus in Redmond, WA on October 2nd – 6th.

We are excited to announce our registration is open and invite you to come learn with other ICAC investigators, forensic examiners, prosecutors, industry professionals and others from around the nation and world.

 » Read more


Click here for more information

Digital Evidence for Judges (DEJ)

Provider: National Computer Forensics Institute (NCFI)

Target Audience: Prosecutors

Topic Area: Cyber Forensics, Cyber Investigations

There is a digital component to nearly every crime.  Today’s judge should have an understanding an insight of technology used in criminal cases involving digital evidence from computers, mobile devices, the cloud and other sources.  DEJ is a 5-day course that provides every attendee with the requisite knowledge using a combination of lecture and practical exercises.  One hour of ethics instruction will be included.

During this course, you will learn:
 

  • Introduction to Cyber Crime and Computer Forensics
  • Computer Hardware
  • Operating Systems and their Respective Forensic Artifacts
  • Data Concepts
  • Search and Seizure of Digital Evidence
  • The Electronic Communications Privacy Act (ECPA) and Authorizing the Collection of Digital Evidence from Third Party Providers
  • The Forensic Process
  • Electronic Evidence
  • Introduction to Networks and the Internet
  • Social Media
  • Evaluating Expert Testimony
  • Fifth Amendment: Encryption and Passwords

 

 » Read more


Click here for more information

IACP Conference