Programs Overview
Law and Policy
High-Tech Crime
Course Calendar
Training Courses Overview
The Investigation of Computer Crime
Network Investigation and Digital Triage
Core Skills for the Investigation of Cellular Devices
Peer-to-Peer Investigations
Online Investigations: Tools, Tips, and Techniques
New! Basic Computer Skills for Law Enforcement (Online)
New! Social Networking Sites: Investigative Tools and Techniques (Online)
Eligibility
Fees
Travel Information
FAQs
ISP List
High-Tech Crime Training Team
High-Tech Crime Publications
Information Sharing
Training Courses Overview
Taught by experienced trainers, our hands-on interactive training curriculum features the courses listed below. These courses may be offered at the SEARCH training facility in Sacramento, CA, or as outreach training at sites nationwide. In addition, we now offer new online courses that individuals with a law enforcement affiliation may take at their own pace. See below for more details.- If you have questions about our training courses, please contact Diane Chin. Or, you can contact the SEARCH High-Tech Crime Training Team at 916/392-2550 ext. 244, and Diane will transfer you to the appropriate person.
- For a calendar of current course offerings, see our Course Calendar.
- To get on our mailing list so we can inform you about upcoming SEARCH training courses, send an email to Diane Chin.
| Course | Description | Who should attend? | Prerequisites | Length | Technical Difficulty |
The Investigation of Computer Crime![]() Course Overview ![]() |
The Internet is alive and well, and is a dynamic resource for millions worldwide. It is also a place for criminals to prey on unsuspecting victims. Many victims are children, some are adults, while others are corporations. This 3-day course teaches criminal justice investigators and support staff how to investigate high-technology theft and computer-related crime. It provides participants with an understanding of computer technology, its application to criminal endeavors, and the issues associated with investigating these cases. SEARCH will provide current real-world case studies and solutions that can be adapted to your current investigations. The course also addresses:
|
Law enforcement investigators and support staff | Understanding of multiple platforms is helpful. | 3 days | Basic-to-intermediate |
Network Investigation and Digital Triage![]() Course Overview ![]() |
This course immerses law enforcement investigators into wired and wireless small office/home office (SOHO) networks, different types of networking devices, and the complexities they can create for investigations and the resulting collection of digital evidence from network devices. This potential evidence includes the volatile data stored in a computer's RAM, as well as encrypted hard drives or files. Traditional digital evidence collection methods frequently result in potential evidence being left at the crime scene or being inadvertently deleted from computers entirely. This 3-day course instructs law enforcement investigators in the skills and techniques of how to (1) gather information about a suspect network prior to and during a search warrant, and (2) preserving and collecting volatile data through on-site digital triage methods. The course also addresses:
|
Law enforcement investigators | Complete The Investigation of Computer Crime course. (Recommended) |
3 days | Intermediate |
Core Skills for the Investigation of Cellular Devices![]() Course Overview ![]() |
Cellular devices are more common today than computers. Terrorist attacks, rapes, assaults, illegal drug operations, child exploitation, and many other crimes are committed using cellular devices. These devices can contain a wealth of evidence for law enforcement. To conduct a thorough investigation, data has to be retrieved from cellular devices and properly analyzed. This 3-day course teaches investigators how to approach the investigation of cellular devices and how these devices are different than traditional computer-based investigations. It covers the basics of cellular networks and how cellular devices function in those networks, as well as the current hardware and software required to obtain evidence from cellular devices. Law enforcement officers, investigators, analysts, and forensic examiners attending this course will obtain the basic skills necessary to conduct cellular devices investigations and retrieve data from seized devices and the latest tools and data collection methodologies available. |
Law enforcement officers, investigators, analysts and forensic examiners | Complete The Investigation of Computer Crime course. (Recommended) |
3 days | Intermediate-to-advanced |
Peer-to-Peer Investigations![]() Course Overview ![]() |
The Internet provides new and unprecedented opportunities for sex offenders to meet and share explicit images and predation methods. One way these individuals share child pornography and other explicit materials is through peer-to-peer (P2P) networks, which allow collectors of child pornography to download and trade "libraries" of images—including movies, images, and text—-with others in the network. Until recently, P2P technology made it difficult for law enforcement to investigate these crimes. However, the development of new software provides investigators powerful tools to identify the movement of pornography in P2P networks, and identify the computers involved in the exchange. A tremendous need for training exists to fully implement the functionality of the technology and leverage investigative outcomes within the law enforcement community. The course addresses:
|
All high-tech crime investigators | Background in online investigations; Understand and have experience with the basic computer crime scene. | 3 days | Intermediate-to-Advanced |
Online Investigations: Tools, Tips, and Techniques![]() Course Overview ![]() |
Most investigators today have a working knowledge of the Internet, but may not be aware of the many free tools available that can take that basic knowledge and turn it into something more robust. These tools help to streamline and enhance investigations—but they are not considered too high-tech or advanced for the basic investigator to master. This non-technical course is aimed at all investigators, and helps them gain the skills and knowledge needed to enhance their online investigations. The course addresses:
|
All investigators—whether their work is in high-tech crime, gangs, homicide, vice, property crimes, narcotics, or other details. | Law Enforcement Affiliation | 2 days | Basic |
Basic Computer Skills for Law Enforcement![]() (An online course) ![]() Course Overview ![]() |
The purpose of this online course is to ensure that investigators are sufficiently prepared, via basic computer skills training, to attend and succeed at more advanced onsite computer investigation classes conducted by SEARCH, the National White Collar Crime Center, and the Internet Crimes Against Children Task Force Program. This is not, however, a computer forensic course. The self-paced, online training is divided into eight learning blocks with multiple learning resources to cover the course materials. These resources include interactive websites, lesson plans, PowerPoint presentations, and other documents. Simply request this training using the link below. SEARCH training staff will review your request, verify your law enforcement affiliation, and issue you the following: a Moodle username, password, and enrollment key. |
All investigators planning to attend further onsite computer investigation courses through SEARCH, NW3C, and the ICAC Task Force Program | Law enforcement affiliation | Self-paced | Basic |
Social Networking Sites: Investigative Tools and Techniques![]() (An online course) ![]() Course Overview ![]() |
The ever-growing popularity of social networking websites has created a vast network of investigative resources. Dealing with the content and construct of these sites challenge investigators who need to locate information, find linkages between people, and use the sites for law enforcement purposes . This online course covers the tools and techniques for conducting an investigation of MySpace.com, although many of the general techniques it covers can be translated to work for other social networking sites. Topics include a brief introduction and overview of social networking websites; dissecting a MySpace profile; creating a MySpace profile; how to search MySpace; how to capture a page for investigative purposes; and how to use the MySpace Visualizer. (SEARCH will add additional modules that address other specific social networking websites, including Facebook and Twitter, as advanced supplements to this course in the future.) Simply request this training using the link below. SEARCH training staff will review your request, verify your law enforcement affiliation, and issue you the following: a Moodle username, password, and enrollment key. |
ALL law enforcement investigators -high-tech crime, gangs, homicide, vice, property crimes, narcotics, or other details | None | Self-paced | Basic |


















