Cyber Investigation 091 Introduction to Previewing ITP-WB (Dec 2017)

This interactive, online module provides an overview of the basic concepts behind secure previewing of digital devices. Students will become familiar with both onsite and offsite secure previewing and learn to identify the two states in which a preview can be conducted (i.e., live-box and dead-box previewing). At the completion of the course, students will be able to recognize the recommended collection order of volatile data (the "order of volatility").

Cyber Investigation 104 Virtual Currency - VC WB (Dec 2017)

This course covers basic information and concepts that serve as an introduction to virtual currencies and their relationship to other types of currency. It covers various types of virtual currency, including the difference between decentralized and centralized currencies, with a strong focus on Bitcoin: what it is, how it is stored, and Bitcoin-specific investigative tips and techniques.

Cyber Investigation 104 Virtual Currency - VC WB

This course covers basic information and concepts that serve as an introduction to virtual currencies and their relationship to other types of currency. It covers various types of virtual currency, including the difference between decentralized and centralized currencies, with a strong focus on Bitcoin: what it is, how it is stored, and Bitcoin-specific investigative tips and techniques.

CyberSecurity 110 - Understanding Digital Footprints (Oct 2017)

This course introduces learners to the concept of digital footprints and best practices in protecting personally identifiable information. Topics include:

  • Limiting an individual's digital footprint;
  • Protecting privacy on social media;
  • The consequences of oversharing personal information; and
  • Steps to take after becoming a target of doxxing.

Cyber Investigation 156 - Post Seizure Evidentiary Concerns - LC6 WB (Oct 2017)

In contrast to the other courses in this series, which deal primarily with the acquisition of digital evidence, "Cyber Investigation 156 - Post Seizure Evidentiary Concerns" (LC6WB) addresses legal issues that appear relatively late in the investigative and judicial process. Topics include:

Cyber Investigation 155 - Online Undercover - LC5WB

November 1 - November 30, 2017- 12 am to 12 pm - This course provides a legal overview of what investigators are and are not permitted to do while conducting online undercover investigations. Topics include terms of service, entrapment and outrageous government misconduct, and wiretapping law as it relates to the recording and documenting of online activities. This course also covers defense strategies commonly used to counter online undercover investigations.

Cyber Investigation 154 - The Stored Communications Act - LC4 Web-based (Oct 2017)

"Cyber Investigation 154 - The Stored Communications Act" (LC4WB) introduces the Stored Communications Act (SCA), emphasizing how this federal law can be useful to state and local law enforcement personnel who need information from online service providers. The course summarizes the various sections of the SCA, and explains how it fits into the larger legal landscape. Topics include the legal process necessary to obtain various types of information from online service providers, as well as tools for law enforcement, such as preservation letters and delayed notice.

Cyber Investigation 153 - LC3 Searching Without A Warrant Web-based (Oct 2017)

"Cyber Investigation 153 - Searching Without A Warrant" (LC3WB) provides legal information on situations involving digital evidence in which the Fourth Amendment does not apply. Topics include reasonable expectation of privacy in a digital context, private searches, “reasonable” government searches, and searches with consent. LC3WB is the third of seven modules in the training series Legal Concerns for Digital Evidence Responders. It can be completed as a standalone course or in combination with the other six modules.

Tor, Onion Routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators (Dec 2017)

Many criminal investigators and analysts have heard of virtual private networks, proxies, and Tor. But, most would not feel comfortable conducting an investigation in which one of these tools was deployed. Similarly, both the Deepnet and Darknet are widely discussed but often not understood. At the same time, criminal investigators and analysts increasingly are required to conduct investigations and collect criminal intelligence information in these spaces or when these tools are being used.

Pages