Training Courses Overview

Taught by experienced trainers, our hands-on interactive training curriculum features the courses listed below. These courses may be offered at the SEARCH training facility in Sacramento, CA, or as outreach training at sites nationwide. In addition, we now offer new online courses that individuals with a law enforcement affiliation may take at their own pace. See below for more details.

  • If you have questions about our training courses, please contact Diane Chin. Or, you can contact the SEARCH High-Tech Crime Training Team at 916/392-2550 ext. 244, and Diane will transfer you to the appropriate person.
  • For a calendar of current course offerings, see our Course Calendar.
  • To get on our mailing list so we can inform you about upcoming SEARCH training courses, send an email to Diane Chin.

Course Description Who should attend? Prerequisites Length Technical Difficulty
The Investigation of Computer Crime



Course
Overview
The Internet is alive and well, and is a dynamic resource for millions worldwide. It is also a place for criminals to prey on unsuspecting victims. Many victims are children, some are adults, while others are corporations. This 3-day course teaches criminal justice investigators and support staff how to investigate high-technology theft and computer-related crime. It provides participants with an understanding of computer technology, its application to criminal endeavors, and the issues associated with investigating these cases. SEARCH will provide current real-world case studies and solutions that can be adapted to your current investigations. The course also addresses:
  • Identity theft
  • Internet-based fraud
  • Child exploitation
  • Hacking and compromised systems
  • Phishing
  Learn More
Law enforcement investigators and support staff Understanding of multiple platforms is helpful. 3 days Basic-to-intermediate
Network Investigation and Digital Triage



Course
Overview
This course immerses law enforcement investigators into wired and wireless small office/home office (SOHO) networks, different types of networking devices, and the complexities they can create for investigations and the resulting collection of digital evidence from network devices. This potential evidence includes the volatile data stored in a computer's RAM, as well as encrypted hard drives or files. Traditional digital evidence collection methods frequently result in potential evidence being left at the crime scene or being inadvertently deleted from computers entirely. This 3-day course instructs law enforcement investigators in the skills and techniques of how to (1) gather information about a suspect network prior to and during a search warrant, and (2) preserving and collecting volatile data through on-site digital triage methods. The course also addresses:
  • Investigative tools for geolocating a suspect network and detecting wireless devices
  • Understanding routers, network storage, and wireless cameras
  • Where volatile memory resides and how to capture it
  • On-scene digital triage and collecting evidence in the field
  Learn More
Law enforcement investigators Complete The Investigation of Computer Crime course.
(Recommended)
3 days Intermediate
Core Skills for the Investigation of Cellular Devices



Course
Overview
Cellular devices are more common today than computers. Terrorist attacks, rapes, assaults, illegal drug operations, child exploitation, and many other crimes are committed using cellular devices. These devices can contain a wealth of evidence for law enforcement. To conduct a thorough investigation, data has to be retrieved from cellular devices and properly analyzed. This 3-day course teaches investigators how to approach the investigation of cellular devices and how these devices are different than traditional computer-based investigations. It covers the basics of cellular networks and how cellular devices function in those networks, as well as the current hardware and software required to obtain evidence from cellular devices. Law enforcement officers, investigators, analysts, and forensic examiners attending this course will obtain the basic skills necessary to conduct cellular devices investigations and retrieve data from seized devices and the latest tools and data collection methodologies available.
  Learn More
Law enforcement officers, investigators, analysts and forensic examiners Complete The Investigation of Computer Crime course.
(Recommended)
3 days Intermediate-to-advanced
Peer-to-Peer Investigations



Course
Overview
The Internet provides new and unprecedented opportunities for sex offenders to meet and share explicit images and predation methods. One way these individuals share child pornography and other explicit materials is through peer-to-peer (P2P) networks, which allow collectors of child pornography to download and trade "libraries" of images—including movies, images, and text—-with others in the network. Until recently, P2P technology made it difficult for law enforcement to investigate these crimes. However, the development of new software provides investigators powerful tools to identify the movement of pornography in P2P networks, and identify the computers involved in the exchange. A tremendous need for training exists to fully implement the functionality of the technology and leverage investigative outcomes within the law enforcement community. The course addresses:
  • IP addressing and digital officer safety
  • Tools for conducting P2P undercover investigations
  • Searching for downloads and contraband
  • Building a case

  Learn More
All high-tech crime investigators Background in online investigations; Understand and have experience with the basic computer crime scene. 3 days Intermediate-to-Advanced
Online Investigations: Tools, Tips, and Techniques



Course
Overview
Most investigators today have a working knowledge of the Internet, but may not be aware of the many free tools available that can take that basic knowledge and turn it into something more robust. These tools help to streamline and enhance investigations—but they are not considered too high-tech or advanced for the basic investigator to master. This non-technical course is aimed at all investigators, and helps them gain the skills and knowledge needed to enhance their online investigations. The course addresses:
  • Advanced Google searching
  • Using Firefox for investigations, including add-ons and the SEARCH Investigative Toolbar
  • Using portable applications for investigations
  • Conducting successful online investigations
  • Digital officer safety
  • Successfully searching, locating, and replicating information from social networking profiles

  Learn More
All investigators—whether their work is in high-tech crime, gangs, homicide, vice, property crimes, narcotics, or other details. Law Enforcement Affiliation 2 days Basic
Basic Computer Skills for Law Enforcement


(An online course)



Course
Overview
The purpose of this online course is to ensure that investigators are sufficiently prepared, via basic computer skills training, to attend and succeed at more advanced onsite computer investigation classes conducted by SEARCH, the National White Collar Crime Center, and the Internet Crimes Against Children Task Force Program. This is not, however, a computer forensic course.

The self-paced, online training is divided into eight learning blocks with multiple learning resources to cover the course materials. These resources include interactive websites, lesson plans, PowerPoint presentations, and other documents.

Simply request this training using the link below. SEARCH training staff will review your request, verify your law enforcement affiliation, and issue you the following: a Moodle username, password, and enrollment key.

  REQUEST THIS TRAINING
All investigators planning to attend further onsite computer investigation courses through SEARCH, NW3C, and the ICAC Task Force Program Law enforcement affiliation Self-paced Basic
Social Networking Sites: Investigative Tools and Techniques


(An online course)



Course
Overview
The ever-growing popularity of social networking websites has created a vast network of investigative resources. Dealing with the content and construct of these sites challenge investigators who need to locate information, find linkages between people, and use the sites for law enforcement purposes . This online course covers the tools and techniques for conducting an investigation of MySpace.com, although many of the general techniques it covers can be translated to work for other social networking sites. Topics include a brief introduction and overview of social networking websites; dissecting a MySpace profile; creating a MySpace profile; how to search MySpace; how to capture a page for investigative purposes; and how to use the MySpace Visualizer.

(SEARCH will add additional modules that address other specific social networking websites, including Facebook and Twitter, as advanced supplements to this course in the future.)

Simply request this training using the link below. SEARCH training staff will review your request, verify your law enforcement affiliation, and issue you the following: a Moodle username, password, and enrollment key.

  REQUEST THIS TRAINING
ALL law enforcement investigators -high-tech crime, gangs, homicide, vice, property crimes, narcotics, or other details None Self-paced Basic