Skip to main content

Training Delivery - Live Video (VTC)

Attention

This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.

Questions?

20241204-90549-55

Submitted by Bryan Lee Dail on

This course covers the identification and extraction of artifacts associated with the Microsoft Windows operating system. Topics include the Change Journal, BitLocker, and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs, Volume Shadow Copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

DF310 Advanced Digital Forensic Analysis: Windows

This course covers the identification and extraction of artifacts associated with the Microsoft Windows operating system. Topics include the Change Journal, BitLocker, and a detailed examination of the various artifacts found in each of the Registry hive files. Students also examine Event Logs, Volume Shadow Copies, link files, and thumbnails. This course uses a mixture of lecture, discussion, demonstration, and hands-on exercises.

20241202-115043-44

Submitted by Bryan Lee Dail on
This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. Topics include the intelligence cycle, analytical thinking skills, the importance of strategic analysis, communication and social media analysis, recommendation development, and legal and ethical issues. Students work hands-on with specialized software to synthesize information and develop various products of intelligence.

IA101 Foundations of Intelligence Analysis Training

This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. Topics include the intelligence cycle, analytical thinking skills, the importance of strategic analysis, communication and social media analysis, recommendation development, and legal and ethical issues. Students work hands-on with specialized software to synthesize information and develop various products of intelligence. The course was developed by a consortium that included NW3C, Law Enforcement Intelligence Units (LEIU), the International Association of Law Enforcement Intelligence Analysis (IALEIA), and the Regional Information Sharing System (RISS).

*Analysis basics. History and purpose of intelligence analysis. Legal issues and ethics. Sources of information. The intelligence cycle.
*Types of analysis. Crime patterns. Associations. Flow. Communications. Financial analysis.
*Creative and critical thinking. Brainstorming. Mind mapping. Steps to critical thinking.
*Deterring crime. Strategic analysis as a tool for law enforcement personnel.
*Hands-on experience. Work as part of a team to analyze information pertaining to several hypothetical cases.

20241202-115039-11

Submitted by Bryan Lee Dail on

This three-day course is dedicated to studying the fundamentals of quantitative and qualitative data analysis and how to formulate arguments in support of criminal investigations and intelligence. Students will learn about data management techniques and a disciplined process to clean and standardize data in preparation for analysis. The course will also explore several common investigative objectives, including the discovery of associations between people and entities, the correlation between unlawful activity and suspects, behavioral affinities, and predictions.

IA300 Advanced Criminal Intelligence: Tradecraft and Analysis

This three-day course is dedicated to studying the fundamentals of quantitative and qualitative data analysis and how to formulate arguments in support of criminal investigations and intelligence. Students will learn about data management techniques and a disciplined process to clean and standardize data in preparation for analysis. The course will also explore several common investigative objectives, including the discovery of associations between people and entities, the correlation between unlawful activity and suspects, behavioral affinities, and predictions. The course will introduce the Enterprise Theory of Crime and how to use network analysis to formulate conclusions about the structure of criminal organizations, their players and roles, the identification of facilitators, charting of financial arrangements, and connections to unlawful activity. The course enables the production of valuable, accurate, and efficient logical inferences produced by collecting data related to unlawful activity.

20241127-131709-45

Submitted by Deominic Napoleon on

TA checkin meetings to follow up on: progress toward completing training, progress with implementation, updates to implementation plan, challenges with implementation, problem-solve as needed, identify availability and sources of recidivism data, discuss next steps

20241122-162318-18

Submitted by Phillip Hernandez on

HAVEN of Lee County in Sanford, North Carolina has requested training and technical assistance to help their staff provide support to incarcerated survivors in their service area. Provide training on the PREA standards related to advocacy, best practices for providing in-person and remote support to incarcerated survivors, and accompaniment during forensic exams and investigatory interviews.

20241122-162313-89

Submitted by Phillip Hernandez on

NC IAFN would like the training to cover issues such as: PREA standards, including a brief history and a focus on standard 115.21; consent, who hold the privilege to consent, how to obtain informed consent; particular concerns for incarcerated survivors, including safety and security issues like handcuffs, shackles, and privacy; concerns related to being asked to complete an exam on an alleged perpetrator. The training will also include time for questions and discussion.

20241122-162311-91

Submitted by Phillip Hernandez on

Meet with Family Services leadership for one 90-minute coaching session, in mid-August, reviewing policies and protocols. Finally, JDI will provide a virtual training for Family Services staff.
The training will be for all adult advocates, numbering approximately 15 people. It will be held via zoom and Family Services has asked that it be held on a Thursday afternoon in September (TBD), from 3-4:30 EST.

Subscribe to Training Delivery - Live Video (VTC)