Through training classes, whether instructor-led or self-paced online courses, as well as workshops provided at national or regional meetings or conferences, SEARCH trains practitioners in cybercrime and digital forensics. SEARCH also offers assistance to individual local, regional, tribal and state agencies nationwide that have questions or next help with cybercrime investigations or computer forensics. We offer assistance either on-site (we travel to you) or via email or telephone. We also offer a range of tools and resources to meet the needs of investigators.
Instructor-Led Training
SEARCH offers its instructor-led courses as a training provider for the Internet Crimes Against Children (ICAC) Task Force Training Program, and directly to agencies and jurisdictions on a contract basis.
Course |
Audience |
Prerequisites |
Length |
Difficulty |
|
Network Investigation and Digital Triage | Law enforcement investigators | 3 days | Basic-to-intermediate | Course Details | |
Peer-to-Peer Investigations | All cybercrime investigators | Background in online investigations; Understand and have experience with the basic computer crime scene. | 3 days | Intermediate-to-advanced | Course Details |
Online Investigations: Tools, Tips, and Techniques | All investigators—whether their work is in cybercrime, gangs, homicide, vice, property crimes, narcotics, or other details. | Law enforcement affiliation | 3 days | Intermediate-to-Advanced | Course Details |
Windows Forensic Environment On-Scene Triage | Law enforcement officers, investigators, analysts and forensic examiners | Background in online investigations; Understand and have experience with the basic computer crime scene. | 2.5 days | Intermediate-to-Advanced | Course Details |
Self-Paced Online Training
The SEARCH Online Learning Portal offers cybercrime investigators free, self-paced learning through a range of online courses, webinars, and microwebinars. Topics include:
- Excel Tips, Tricks and Tweaks
- MAC Address Device Identification and Geolocation
- Examination of Android OS CSAM Ransomware
- Playing in the Windows Sandbox
- Social Media Search Tecniques
- Hash Algorithms
- Obtaining User Data, and more
Access to the portal is limited to individuals with a law enforcement affiliation. On your first visit, you will create an account, which is subject to approval by SEARCH staff. Once approved, you will be able to create a username and password and log in to use the learning tools.
Modular Course and Conference Blocks
SEARCH can tailor our curriculum into shorter, condensed versions that fit into your meeting or conference needs. Take a look at our individual course blocks and let us know how we can help.
Online Tools & Tips
- Google and Firefox as Investigative Tools
- Portal Apps
- Internet Protocol (IP) Addresssing
- Digital Officer Safety
- Become a Google Jedi: Save Yourself from Information Overload
- Firefox Add-ons: Free Resources to Enhance Your Investigation
- mIRC Investigations
- Investigative USB Apps
Social Network Investigations
- Introduction to Social Networking Investigations
- Introduction to Social Networking Investigations-Facebook
- Introduction to Social Networking Website Investigations
Virtualization, Wireless Networks, Volatile Data
- Using Virtual Machines in an Investigative Capacity
- Wireless Network Investigation
- Field Triage
Resources for Cybercrime and Digital Forensic Investigators
Practical Operational Assistance
Need assistance or have questions related to cybercrime investigations or digital forensics? We can help! Just fill out this form and we will get back to you by phone or email.