TTA Catalog

BJA NTTAC's online TTA Catalog is a feature for BJA's providers to market upcoming webinars, training opportunities, and technical assistance to the justice community based on their needs and locations. The BJA NTTAC team also shares conferences, trainings, and events from across the field that may be of interest to the justice community. Users are able to search by various filters (e.g., event type, date range, program area, keyword, location) in order to find events that meet their needs. The TTA "Catalog" tab displays results in a table view. The "Month", "Week", "Day", and "Year" tabs display events in calendar views. The "Upcoming" tab lists all upcoming events while the "Previous" tab lists all previous events.

In addition to events, the TTA Catalog allows users to browse or search through BJA's list of TTA provider organizations. Use the "TTA Providers" tab to search for BJA TTA providers by various filters (e.g., program area, keyword, criminal justice professional experience). The "TTA Providers" tab displays results in a table view. The CSV button at the bottom left corner of the page will export results into a .csv file (similar to Excel).

Pages

  • Wednesday, February 14, 2018 - 2:00pm to 3:30pm
    Webinar - How Correctional Agencies Can Develop and Implement Collaborative Comprehensive Case Plans

    Attend a webinar hosted by the National Reentry Resource Center, with funding support from the U.S. Department of Justice’s Bureau of Justice Assistance.

  • Wednesday, February 14, 2018 - 8:00am to Friday, February 16, 2018 - 5:00pm
    Cyber Investigation 150 Introduction to Cellular Investigations ICI (Feb 2018)

    This course covers the acquisition and analysis of the various types of call detail records obtained from cellular providers. It focuses on data analysis using Microsoft Excel, as well as techniques for presenting findings in case reports or in court. Students receive a copy of PerpHound, the National White Collar Crime Center's (NW3C) free software tool for the analysis of call detail records. This course also covers best practices for seizing, preserving, and acquiring evidence internal to a cellular phone.

  • Tuesday, February 13, 2018 - 2:00pm to 3:00pm
    Automated License Plate Reader (ALPR) Information in Investigations Webinar

    Redlands, California Police Department Assistant Police Chief Travis Martinez will share strategies for investigators on how to use Automated License Plate Recognition (ALPR) information to enhance criminal investigations.

  • Monday, February 12, 2018 - 8:00am to Tuesday, February 13, 2018 - 5:00pm
    Cyber Investigation 201 - Social Media & Open Source Investigations SMOSI (Feb 2018)

    The "Cyber Investigation 201 - Social Media and Open Source Investigations" course covers the skills investigators need to conduct successful online investigations involving social media. Topics include internet basics, such as IP addresses and domains; an overview of currently popular social media platforms; and best practices for building an online undercover profile.

  • Thursday, February 8, 2018 - 2:00pm to 3:15pm
    Webinar - County Roles and Opportunities in Opioid Treatment for Justice-Involved Individuals

    Counties are uniquely positioned to lead efforts to advance safety and justice, as they run 91 percent of all jails with nearly 11 million people admitted every year. Join the National Association of Counties for a three-part webinar series that will focus on key areas of local criminal justice systems that most affect counties and offer strategies counties can employ to address these issues, make their justice systems work more effectively and efficiently, and ultimately lead to safer and healthier communities.

  • Thursday, February 8, 2018 - 8:00am to Friday, February 9, 2018 - 5:00pm
    CP OSNII - Successful Use of Online Social Networking for Investigations and Intelligence (Feb 8, 2018)

    This two-day course provides students with an up-to-date understanding of how social networking sites work and how members act and interact. Students will learn what information is available on various sites and how to integrate that information into criminal investigations and criminal intelligence analysis.

    The course is designed for criminal intelligence analysts, special agents, and other investigators.

    Students with any level of familiarity with the internet and computers, from beginning to advanced, will find this course beneficial.

    A few key learning points:

  • Tuesday, February 6, 2018 - 1:00pm to 2:15pm
    Webinar - CTAS FY 2018: Funding Opportunities for Healing to Wellness Courts

    This webinar will provide a brief overview of Healing to Wellness Court funding opportunities available within the fiscal year 2018 Coordinated Tribal Assistance Solicitation (CTAS). This webinar focuses primarily on Purpose Areas 3 and 8, which can include funding for adult, family, and juvenile Healing to Wellness Courts. The webinar details the CTAS application process, updates from last year, important considerations for drafting a Wellness Court narrative, general grant writing tips, and available technical assistance.

  • Tuesday, February 6, 2018 - 9:00am to 10:30am
    Webinar: Trauma-Informed Supervision Series - Part #1

    Learn more about trauma-informed supervision strategies when working with clients during this three-part webinar series.

    Part #1: "What is Trauma?"

    • Define trauma and what it means to be trauma-informed.
    • Explore how stress and trauma impact the brain and the primary areas of the brain involved with responses to stress.
    • Review various types of trauma to consider when working with clients (i.e., intergenerational, childhood, and complex trauma).
  • Tuesday, February 6, 2018 - 8:00am to Wednesday, February 7, 2018 - 5:00pm
    CP IIT - Internet Intelligence Training

    This two-day course offers a comprehensive program to Internet investigations and open-source intelligence gathering. Students will learn how to enhance their search skills to effectively use Internet resources for locating information online.

    Key Learning Points:

  • Tuesday, February 6, 2018 - 8:00am to Friday, February 9, 2018 - 5:00pm
    Cybersecurity 235 - Basic Network Intrusion Investigations BNII (Feb 2018)

    The "Cybersecurity (CS) 235 - Basic Network Intrustion Investigations" (BNII) course covers the skills and techniques involved in responding to a network security incident. The course focuses on the identification, extraction, and detailed examination of artifacts associated with network and intrusions. Memory analysis, host machine forensics, network traffic and log analysis, malware analysis, and virtual machine sandboxing are covered through lecture, discussion, and hands-on exercises.

  • Thursday, February 1, 2018 - 3:00pm to 4:00pm
    Cybercrime and Defenses: A 101 Introduction To How It Works (February 2018)

    The news seems to be filled with stories of ransomware locking out entire departments from their computers, distributed denial-of-service (DDoS) attacks shutting down websites, and data dumps containing passwords or other sensitive information. Trying to understand these attacks can seem overwhelming, almost like learning a foreign language, but it does not have to.

  • Thursday, February 1, 2018 (All day) to Wednesday, February 28, 2018 (All day)
    NW3C-FC-115 Introduction to Mortgage Fraud (MORF) (Feb 2018)

    The "Introduction to Mortgage Fraud" web-based course (MORF-WB) presents awareness-level information on mortgage fraud. The course covers basic definitions and terminology, common types of mortgage fraud schemes, components of fraud, roles in the mortgage process, and legal explanations. Students will also learn to recognize fraud indicators associated with a variety of schemes and opportunities to commit fraud throughout the mortgage process. A sample mortgage loan application and other forms used in the process are available to download within this course.

  • Thursday, February 1, 2018 (All day) to Wednesday, February 28, 2018 (All day)
    NW3C FC 141 - Human Trafficking Awareness for Law Enforcement Officers (Feb 2018)

    "Human Trafficking Awareness for Law Enforcement Officers" is an interactive e-learning course designed to provide law enforcement officers with an overview of human trafficking. Completing this course will contribute to the student’s understanding of the various elements involved in human trafficking.

  • Wednesday, January 31, 2018 - 2:00pm to 3:00pm
    BJA NTTAC Webinar - Increasing Law Enforcement's Analytical Capacity: Analysis of Officer-involved Shooting Incidents

    The Police Foundation and the Major Cities Chiefs Association (MCCA) are in the second year of an innovative partnership to construct a national officer-involved shooting (OIS) database. Recognizing that the ability to examine OIS incidents across agencies is limited, this OIS data collection initiative seeks to understand OIS trends and their causes and correlates in order to assist law enforcement in maintaining situational awareness of OIS incidents locally and regionally. The ultimate goal is to obtain standardized, national-level data on OIS incidents. With funding from the U.S.

  • Wednesday, January 31, 2018 - 8:00am to Friday, February 2, 2018 - 5:00pm
    Cyber Investigation 150 Introduction to Cellular Investigations ICI (Jan - Feb 2018)

    The "Cyber Investigation (CI) 150 Introduction to Cellular Investigations" (ICI) course covers the acquisition and analysis of the various types of call detail records obtained from cellular providers. It focuses on data analysis using Microsoft Excel, as well as techniques for presenting findings in case reports or in court. Students receive a copy of PerpHound, National White Collar Crime Center's (NW3C) free software tool for the analysis of call detail records. This course also covers the best practices for seizing, preserving, and acquiring evidence internal to a cellular phone.

  • Tuesday, January 30, 2018 - 8:00am to Friday, February 2, 2018 - 5:00pm
    Cybercop 315 Windows Artifacts - WinArt

    The "Cybercop (CC) 315 Windows Artifacts - WinArt" (WinArt) course covers the identification and extraction of artifacts associated with the current versions of Microsoft Windows operating systems (Vista through Windows 10) and the New Technology file system. Topics include the change journal, BitLocker, and a detailed examination of the various artifacts found in each of the registry hive files. Students examine event logs, volume shadow copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

  • Tuesday, January 30, 2018 - 8:00am to Friday, February 2, 2018 - 5:00pm
    Cybercop 325 - Macintosh Forensic Analysis

    The "Cybercop (CC) 325 - Macintosh Forensics Analysis" (MFA) course provides the fundamental knowledge and skills necessary to identify and collect volatile data, acquire forensically-sound images of Apple Macintosh computers, and perform forensic analysis of the macOS operating system and application artifacts. Students gain hands-on experience scripting and using automated tools to conduct a simulated live triage. Students will use multiple methods to acquire forensically-sound images of Apple Macintosh computers and identify unique challenges that this task may present.

  • Monday, January 29, 2018 - 8:00am to Tuesday, January 30, 2018 - 5:00pm
    Cyber Investigation 101 - Secure Techniques for Onsite Preview (Jan 2018)

    The "Cyber Investigation (CI) - Secure Techniques for Onsite Preview" course covers the usage and configuration of two tools (Paladin/Autopsy and osTriage) designed to preview a non-mobile digital device and export files of evidentiary value. DAY ONE is designed to preview a non-mobile digital device and export files of evidentiary value from a device that is powered on. DAY TWO is designed to preview a non-mobile digital device and export files of evidentiary value from a device that is powered off.

  • Friday, January 26, 2018 - 3:00pm to 4:00pm
    Better Criminal Justice Outcomes Through Prosecutor-led Diversion: A Review of Two Recent National Institute of Justice Studies

    During this webinar hosted by the Association of Prosecuting Attorneys (APA), panelists will discuss two recently released National Institute of Justice studies that document the rich variety and efficacy of prosecutor-led diversion programs being used by prosecutors from across the nation. Panelists will illustrate how these programs are reducing convictions and collateral consequences, reducing recidivism, reducing the need for costly incarceration, and saving limited criminal justice system dollars and resources.

  • Friday, January 26, 2018 - 2:00pm to 4:00pm
    Webinar: Networks of Criminals (NOC) Youth Offender Program - IACA Innovations in Crime Analysis Award Winner

    The Networks of Criminals (NOC) Youth Offender Program is an innovative offender-based strategy and intelligence process that utilizes an algorithmic methodology to identify youth offenders and their social networks currently impacting Milwaukee’s motor vehicle theft and robbery trends. NOC offenders are identified every week using a unique methodology for the comparative analysis of up to 500 emerging or perpetual like-offenders based on their 1) criminal history, 2) threat assessment, and 3) social network analysis.

  • Thursday, January 25, 2018 - 2:00pm to 3:15pm
    Webinar - County Roles and Opportunities in Advancing Safety and Justice Through Collaboration

    Counties are uniquely positioned to lead efforts to advance safety and justice, as they run 91 percent of all jails with nearly 11 million people admitted every year. Join the National Association of Counties for a three-part webinar series that will focus on key areas of local criminal justice systems that most affect counties and offer strategies counties can employ to address these issues, make their justice systems work more effectively and efficiently, and ultimately lead to safer and healthier communities.

  • Thursday, January 25, 2018 - 8:00am to 5:00pm
    Pharmaceutical Crime - Advanced Investigative Techniques (Jan 2018)

    This course is for the detective who is assigned to a pharmaceutical crime unit or investigation. This course will address the crimes associated with pharmaceutical drug diversion, criminal methods, investigative techniques, evidence collection, and the importance of involving a prosecutor at the onset to prepare the case for successful prosecution.

  • Wednesday, January 24, 2018 - 8:00am to 5:00pm
    Pharmaceutical Crime - Tools for the Street (Jan 2018)

    This course is for the street patrol officers/new detectives who need to understand the scope of the problem, the types of crimes that may be encountered, how to respond to the scene, awareness of associated evidence, interview techniques, and documentation to further an investigation for a successful prosecution.

  • Tuesday, January 23, 2018 - 8:00am to Thursday, January 25, 2018 - 5:00pm
    NW3C-FC 201-Financial Records Investigative Skills (FRIS) (Jan 2018)

    The "Financial Crime (FC) 201 - Financial Records Investigative Skills" (FRIS) course builds on the concepts introduced in "FC 101 - Financial Investigations Practical Skills" and "FC 105 - Financial Records Examination and Analysis," introducing investigators and prosecutors to emerging issues in financial crime. Topics include understanding money laundering, analyzing large financial data sets, conducting effective interviews, and managing large amounts of financial evidence. This course consists of a mix of lecture, discussion, and hands-on exercises.

  • Tuesday, January 23, 2018 - 8:00am to Friday, January 26, 2018 - 5:00pm
    Cybersecurity 235 - Basic Network Intrusion Investigations BNII (Jan 2018)

    This course covers the skills and techniques involved in responding to a network security incident. The course focuses on the identification, extraction, and detailed examination of artifacts associated with network and intrusions. Memory analysis, host machine forensics, network traffic and log analysis, malware analysis, and virtual machine sandboxing are covered through lecture, discussion, and hands-on exercises. Additional topics include key cybersecurity concepts and issues, as well as the various classifications and types of network attacks.

Pages