The National Consortium for Justice Information and Statistics

The National Consortium for Justice Information and Statistics

Generic filters

Cybercrime & Digital Forensics

Through training classes, whether instructor-led or self-paced online courses, as well as workshops provided at national or regional meetings or conferences, SEARCH trains practitioners in cybercrime and digital forensics. SEARCH also offers assistance to individual local, regional, tribal and state agencies nationwide that have questions or next help with cybercrime investigations or computer forensics. We offer assistance either on-site (we travel to you) or via email or telephone. We also offer a range of tools and resources to meet the needs of investigators.

Instructor-Led Training

SEARCH offers its instructor-led courses as a training provider for the Internet Crimes Against Children (ICAC) Task Force Training Program, and directly to agencies and jurisdictions on a contract basis.

Network Investigation and Digital Triage Law enforcement investigators   3 days Basic-to-intermediate Course Details
Peer-to-Peer Investigations All cybercrime investigators Background in online investigations; Understand and have experience with the basic computer crime scene. 3 days Intermediate-to-advanced Course Details
Online Investigations: Tools, Tips, and Techniques All investigators—whether their work is in cybercrime, gangs, homicide, vice, property crimes, narcotics, or other details. Law enforcement affiliation 3 days Intermediate-to-Advanced Course Details
Windows Forensic Environment On-Scene Triage Law enforcement officers, investigators, analysts and forensic examiners Background in online investigations; Understand and have experience with the basic computer crime scene. 2.5 days Intermediate-to-Advanced Course Details

Self-Paced Online Training

The SEARCH Online Learning Portal offers cybercrime investigators free, self-paced learning through a range of online courses, webinars, and microwebinars. Topics include:

  • Excel Tips, Tricks and Tweaks
  • MAC Address Device Identification and Geolocation
  • Examination of Android OS CSAM Ransomware
  • Playing in the Windows Sandbox
  • Social Media Search Tecniques
  • Hash Algorithms
  • Obtaining User Data, and more

Access to the portal is limited to individuals with a law enforcement affiliation. On your first visit, you will create an account, which is subject to approval by SEARCH staff. Once approved, you will be able to create a username and password and log in to use the learning tools.

Modular Course and Conference Blocks

SEARCH can tailor our curriculum into shorter, condensed versions that fit into your meeting or conference needs. Take a look at our individual course blocks and let us know how we can help.

  • Google and Firefox as Investigative Tools
  • Portal Apps
  • Internet Protocol (IP) Addresssing
  • Digital Officer Safety
  • Become a Google Jedi: Save Yourself from Information Overload
  • Firefox Add-ons: Free Resources to Enhance Your Investigation
  • mIRC Investigations
  • Investigative USB Apps
  • Introduction to Social Networking Investigations
  • Introduction to Social Networking Investigations-Facebook
  • Introduction to Social Networking Website Investigations
  • Using Virtual Machines in an Investigative Capacity
  • Wireless Network Investigation
  • Field Triage

Resources for Cybercrime and Digital Forensic Investigators

Practical Operational Assistance

Need assistance or have questions related to cybercrime investigations or digital forensics? We can help! Just fill out this form and we will get back to you by phone or email.

Scroll to Top