TTA Catalog

BJA NTTAC's online TTA Catalog is a feature for BJA's providers to market upcoming webinars, training opportunities, and technical assistance to the justice community based on their needs and locations. The BJA NTTAC team also shares conferences, trainings, and events from across the field that may be of interest to the justice community. Users are able to search by various filters (e.g., event type, date range, program area, keyword, location) in order to find events that meet their needs. The TTA "Catalog" tab displays results in a table view. The "Month", "Week", "Day", and "Year" tabs display events in calendar views. The "Upcoming" tab lists all upcoming events while the "Previous" tab lists all previous events.

In addition to events, the TTA Catalog allows users to browse or search through BJA's list of TTA provider organizations. Use the "TTA Providers" tab to search for BJA TTA providers by various filters (e.g., program area, keyword, criminal justice professional experience). The "TTA Providers" tab displays results in a table view. The CSV button at the bottom left corner of the page will export results into a .csv file (similar to Excel).

Pages

  • Sunday, July 22, 2018 - 4:00pm to Wednesday, July 25, 2018 - 4:00pm
    2018 National Forum on Criminal Justice

    Sponsored by the National Criminal Justice Association (NCJA) and the IJIS Institute (IJIS), the National Forum on Criminal Justice showcases programs, research and technologies that help justice practitioners and decision makers in states, local communities and tribal nations address pressing public safety issues. It is the only criminal justice conference that brings together leaders from federal, state, local and tribal government and the public and private sector to share real world strategies and solutions from around the country.

  • Tuesday, June 19, 2018 - 8:00am to Friday, June 22, 2018 - 5:00pm
    Cybercop 350 Mobile Device Forensic Analysis (June 2018)

    The "Cybercop (CC) 350 - Mobile Device Forensic Analysis" (MDFA) course provides the fundamental knowledge and skills necessary to preserve, acquire, and analyze data on iOS devices (iPod Touch, iPhone, and iPad), as well as various Android devices. Students use forensically sound tools and techniques to acquire and analyze potential evidence. Topics include identifying potential threats to data stored on devices, available imaging options, accessing locked devices, and the default folder structure.

  • Tuesday, June 12, 2018 - 8:00am to Wednesday, June 13, 2018 - 5:00pm
    CP IIT - Internet Intelligence Training: Social Media EXPLOITATION (Jun 2018)

    This two-day course offers a comprehensive program to Internet investigations and open source intelligence gathering. Students will learn how to enhance their search skills to effectively use Internet resources for locating information online.

    Key Learning Points:

  • Thursday, May 3, 2018 - 8:00am to 5:00pm
    NW3C-FC 122 - Intellectual Property Theft Training (May 2018)

    From baby formula to auto parts, criminals counterfeit all kinds of products. This one-day training is a real “eye-opener” for investigators and prosecutors on the potential dangers and economic repercussions of counterfeit products.

    In response to the serious threat of counterfeit products and other types of intellectual property (IP) crime, the National White Collar Crime Center (NW3C) and the National Association of Attorneys General are providing training to state and local law enforcement in the area of IP crime.

  • Thursday, May 3, 2018 - 8:00am to 4:00pm
    CP HUNT - "How To Hunt" Criminals and Terrorists: The Actionable Intelligence Workshop

    This one-day workshop is designed to instruct police department commanders, their police officers assigned to both patrol and investigative functions, and their analysts on how to aggressively collect and use actionable intelligence. The same intelligence techniques can be used against both criminal and terrorist targets. The intelligence training taught in this workshop is designed to supplement the existing operational professionalism, skills, and experience within the audience.

    Key Modules:

  • Tuesday, April 24, 2018 - 8:00am to Thursday, April 26, 2018 - 5:00pm
    NW3C-FC 201-Financial Records Investigative Skills (FRIS) (Apr 2018)

    The "Financial Crime (FC) 201 - Financial Records Investigative Skills" (FRIS) course builds on the concepts introduced in "FC 101 - Financial Investigations Practical Skills" and "FC 105 - Financial Records Examination and Analysis," introducing investigators and prosecutors to emerging issues in financial crime. Topics include understanding money laundering, analyzing large financial data sets, conducting effective interviews, and managing large amounts of financial evidence. This course consists of a mix of lecture, discussion, and hands-on exercises.

  • Tuesday, April 17, 2018 - 8:00am to 5:00pm
    Law Enforcement Suicide Prevention Training of Trainers (Apr 17 2018)

    This eight-hour "Law Enforcement Suicide Prevention Training of Trainers" training will heighten awareness and help officers understand the indicators, the issues involved, potential solutions, and important protocols to consider. It will also provide materials for ongoing in-service and roll call training within the agency.

  • Wednesday, April 4, 2018 - 8:00am to 5:00pm
    Law Enforcement Suicide Prevention Training of Trainers (Apr 4 2018)

    This eight-hour "Law Enforcement Suicide Prevention Training of Trainers" training will heighten awareness and help officers understand the indicators, the issues involved, potential solutions, and important protocols to consider. It will also provide materials for ongoing in-service and roll call training within the agency.

  • Wednesday, April 4, 2018 - 8:00am to 5:00pm
    NW3C-FC 122 - Intellectual Property Theft Training (Apr 2018)

    From baby formula to auto parts, criminals counterfeit all kinds of products. This one-day training is a real “eye-opener” for investigators and prosecutors on the potential dangers and economic repercussions of counterfeit products.

    In response to the serious threat of counterfeit products and other types of intellectual property (IP) crime, the National White Collar Crime Center (NW3C) and the National Association of Attorneys General are providing training to state and local law enforcement in the area of IP crime.

  • Tuesday, March 27, 2018 - 8:00am to Friday, March 30, 2018 - 5:00pm
    Cybercop 250 Linux Open Source Forensics

    The "Cybercop (CC) 250 Linux Open Source Forensics" course teaches students how to use free and open source software to conduct digital forensic examinations. Students learn to locate and install free Linux-based forensic software. After covering key forensic concepts as applied to open source software, basic forensic analysis techniques are covered.

  • Tuesday, March 20, 2018 - 8:00am to 5:00pm
    Law Enforcement Suicide Prevention Training of Trainers (Mar 2018)

    This eight-hour "Law Enforcement Suicide Prevention Training of Trainers" training will heighten awareness and help officers understand the indicators, the issues involved, potential solutions, and important protocols to consider. It will also provide materials for ongoing in-service and roll call training within the agency.

  • Wednesday, March 14, 2018 - 8:00am to 5:00pm
    NW3C-FC 122 - Intellectual Property Theft Training (Mar 2018)

    From baby formula to auto parts–criminals counterfeit all kinds of products. This one-day training is a real “eye-opener” for investigators and prosecutors about the potential dangers and economic repercussions of counterfeit products.
    In response to the serious threat of counterfeit products and other types of intellectual property (IP) crime, NW3C and the National Association of Attorneys General (NAAG) are providing training to state and local law enforcement in the area of IP crime.

    During the training, students are provided with a state-specific workbook that includes statutes that may be applied to IP crimes, sample organizational documents for IP investigations, and other useful resources for IP investigations and prosecutions. Attendees are also provided with two resource CDs: one for law enforcement and one that can be used for the general public. These CDs contain resources to assist investigators and prosecutors with their IP crime cases.

    The training is a mix of lecture, discussion and interactive exercises which includes:

    Health and safety issues resulting from counterfeit products
    Economic ramifications of IP crime
    Investigative techniques and prosecutorial theories
    IP crime connection to organized crime, gangs and terrorism
    Hands-on exercise, "real" examples of counterfeit products, and more

  • Tuesday, March 13, 2018 - 9:00am to 10:30am
    Webinar: Trauma-Informed Supervision Series - Part #3: Interacting with Traumatized Clients: From Knowledge to Skill Practice

    Learn more about trauma-informed supervision strategies when working with your clients during this three-part webinar series.

    Part #3: 'Interacting with Traumatized Clients: From Knowledge to Skill Practice"

  • Tuesday, March 13, 2018 - 8:00am to Friday, March 16, 2018 - 5:00pm
    Cybercop 325 - Macintosh Forensic Analysis (Mar 2018)

    The "Cybercop (CC) 325 - Macintosh Forensic Analysis" (MFA) course provides the fundamental knowledge and skills necessary to identify and collect volatile data, acquire forensically sound images of Apple Macintosh computers, and perform forensic analysis of macOS operating system and application artifacts. Students gain hands-on experience scripting and using automated tools to conduct a simulated live triage. Students will use multiple methods to acquire forensically sound images of Apple Macintosh computers and identify unique challenges that this task may present.

  • Tuesday, March 13, 2018 - 8:00am to Friday, March 16, 2018 - 5:00pm
    Cyber Security 235 Basic Network Intrusion Investigations (Mar 2018)

    This course covers the skills and techniques involved in responding to a network security incident. The course focuses on the identification, extraction, and detailed examination of artifacts associated with network and intrusions. Memory analysis, host machine forensics, network traffic and log analysis, malware analysis, and virtual machine sandboxing are covered through lecture, discussion, and hands-on exercises. Additional topics include key cybersecurity concepts and issues, as well as the various classifications and types of network attacks.

  • Thursday, March 8, 2018 - 8:00am to Friday, March 9, 2018 - 5:00pm
    Public Defense Training Indiana

    The National Association of Criminal Defense Lawyers will provide training for public defense providers in Indianapolis, Indiana on March 8-9, 2018. The program title and topics are being decided in cooperation with the Indiana Public Defender Council.

  • Thursday, March 8, 2018 - 8:00am to Friday, March 9, 2018 - 5:00pm
    Cybercop 101 Basic Digital Forensic Imaging BDFI (Mar 2018)

    This course covers the fundamentals of computer operations, hardware function, and configuration, as well as best practices for the protection, preservation, and imaging of digital evidence. Presentations and hands-on exercises cover topics such as partitioning, data storage, hardware and software write blockers, boot-up and shutdown processes, live imaging, encryption detection, and duplicate imaging. This course incorporates computer forensic applications that experienced practitioners are currently using in the field.

    Course structure:

  • Wednesday, March 7, 2018 - 8:00am to Thursday, March 8, 2018 - 5:00pm
    Cyber Investigation 101 Secure Techniques for Onsite Preview - STOP (Mar 7 2018)

    The "Cyber Investigation (CI) 101 - Secure Techniques for Onsite Preview" course covers the usage and configuration of two tools (Paladin/Autopsy and osTriage) designed to preview a non-mobile digital device and export files of evidentiary value. DAY ONE is designed to preview a non-mobile digital device and export files of evidentiary value from a device that is powered on. DAY TWO is designed to preview a non-mobile digital device and export files of evidentiary value from a device that is powered off.

  • Tuesday, March 6, 2018 - 8:00am to Wednesday, March 7, 2018 - 5:00pm
    Cyber Investigation 201 - Social Media & Technical Skills - SMTS (Mar 2018)

    This course covers the skills investigators need to conduct successful online investigations involving social media. Topics include internet basics, such as IP addresses and domains; an overview of currently popular social media platforms; and best practices for building an online undercover profile. Instructors demonstrate both open-source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites.

    Course structure:

  • Monday, March 5, 2018 - 8:00am to Tuesday, March 6, 2018 - 5:00pm
    Cyber Investigation 101 Secure Techniques for Onsite Preview - STOP (Mar 5 2018)

    The "Cyber Investigation (CI) 101 - Secure Techniques for Onsite Preview" course covers the usage and configuration of two tools (Paladin/Autopsy and osTriage) designed to preview a non-mobile digital device and export files of evidentiary value. DAY ONE is designed to preview a non-mobile digital device and export files of evidentiary value from a device that is powered on. DAY TWO is designed to preview a non-mobile digital device and export files of evidentiary value from a device that is powered off.

  • Monday, March 5, 2018 - 8:00am to Tuesday, March 6, 2018 - 5:00pm
    CP IIT - Internet Intelligence Training: Social Media EXPLOITATION (Mar 2018)

    This two-day course offers a comprehensive program to Internet investigations and open source intelligence gathering. Students will learn how to enhance their search skills to effectively use Internet resources for locating information online.

    Key Learning Points:

  • Wednesday, February 28, 2018 - 8:00am to Thursday, March 1, 2018 - 5:00pm
    CP OSNII - Successful Use of Online Social Networking for Investigations and Intelligence (Feb 28, 2018)

    This two-day course provides students with an up-to-date understanding of how social networking sites work and how members act and interact. Student will learn what information is available on various sites and how to integrate that information into criminal investigations and criminal intelligence analysis.The course is designed for criminal intelligence analysts, special agents, and other investigators. Students with any level of familiarity with the Internet and computers, from beginning to advanced, will find this course beneficial.

    A Few Key Learning Points:

  • Tuesday, February 27, 2018 - 2:00pm to 3:00pm
    Webinar - Peer Recovery Support Services – Options, Opportunities, and Challenges for Jurisdictions

    The Bureau of Justice Assistance (BJA) leadership, in collaboration with the Comprehensive Opioid Abuse Program (COAP) team, invites you to this no-cost webinar on February 27, 2018 at 2:00 p.m. ET to learn how peer recovery support services are helping jurisdictions across the country address the opioid epidemic, bringing help and hope to individuals and families.

  • Tuesday, February 27, 2018 - 9:00am to 10:30am
    Webinar: Trauma-Informed Supervision Series - Part #2: The Long Reach of Intergenerational Trauma: Connecting the Dots

    Learn more about trauma-informed supervision strategies when working with clients during this three-part webinar series.

    Part #2: "The Long Reach of Intergenerational Trauma: Connecting the Dots"

    • Discuss who trauma impacts and how it presents within the U.S. population.
    • Obtain a deeper understanding about intergenerational trauma, including through the lens of World War II survivors, as told by Viktor Frankl.
    • Examine the link between trauma and criminal behavior.
  • Tuesday, February 27, 2018 - 8:00am to Friday, March 2, 2018 - 5:00pm
    Cybersecurity 235 - Basic Network Intrusion Investigations BNII (Feb - Mar 2018)

    The "Cybersecurity (CS) 235 - Basic Network Intrusion Investigations" (BNII) course covers the skills and techniques involved in responding to a network security incident. The course focuses on the identification, extraction, and detailed examination of artifacts associated with network and intrusions. Memory analysis, host machine forensics, network traffic and log analysis, malware analysis, and virtual machine sandboxing are covered through lecture, discussion, and hands-on exercises.

Pages