Through instructor-led training classes, as well as workshops provided at national or regional meetings or conferences, SEARCH trains practitioners in cybercrime and digital forensics. SEARCH also offers assistance to individual local, regional, tribal and state agencies nationwide that have questions or next help with cybercrime investigations or computer forensics. We offer assistance either on-site (we travel to you) or via email or telephone. We also offer a range of tools and resources to meet the needs of investigators.
Resources for Cybercrime and Digital Forensic Investigators
Instructor-Led Training
SEARCH offers its instructor-led courses as a training provider for the Internet Crimes Against Children (ICAC) Task Force Training Program, and directly to agencies and jurisdictions on a contract basis.
Course | Audience | Prerequisites | Length | Difficulty | |
Cybercrime Investigations: Leveraging Social Media and Open-Source Intelligence | All investigators | 3 days | Basic-to-intermediate | Course Details | |
Mobile Device Forensics for Investigators | All law enforcement who work in ICAC, high-tech crime or other crimes that contain a digital component | 3 days | Basic-to-Intermediate | Course Details | |
Freeware Forensics: From Acquisition to Analysis Using Free Tools | Digital forensic examiners in law enforcement | Foundational background in digital forensics is recommended. | 3 days | Intermediate-to-Advanced | Course Details |
Peer-to-Peer Investigations | All cybercrime investigators | Background in online investigations; Understand and have experience with the basic computer crime scene. | 2.5 days | Intermediate-to-Advanced | Course Details |
Digital Forensics for Prosecutors | All prosecutors who work in ICAC, high-tech crime or other crimes that contain a digital component | 3 days | Basic-to-Intermediate | Course Details | |
Cybercrime Investigations for Prosecutors | All prosecutors who work in ICAC, high-tech crime or other crimes that contain a digital component | 3 days | Basic-to-Intermediate | Course Details |
Modular Course and Conference Blocks
SEARCH can tailor our curriculum into shorter, condensed versions that fit into your meeting or conference needs. Take a look at our individual course blocks and let us know how we can help. Conference Block Sessions
- Freeware Forensics: Leveraging Free Tools for Digital Forensic Analysis
- Fundamentals of Cybercrime Investigations
- Safe Sandboxing: Using Virtual Machines and Emulators
- OSINT Techniques for ICAC Investigations (or sometimes shortened to just OSINT for ICAC)
- Become a Google Jedi: Building a Better Boolean String
- Using Google Earth to Plot Geolocation Points, Create Maps, and Visuals
- Technology Artifact Awareness: The 4th Dimension of Crime
- Scrolling with Purpose: Mastering the Art of Social Media Searching
- Handheld Evidence: Terminology, Seizure Considerations, Understanding Mobile Forensic Reports, and Manipulating Report Data
- CSAM Ransomware: Case Study
- What Breadcrumbs Are You Broadcasting: Digital Officer Safety
- Who’s the MAC: MAC Address Device Identification and Geolocation
- You Down With OPP (Other People’s Python)?
- Fortifying Your Fortress: Personal Cybersecurity Awareness
- Darknet Fundamentals
- Saving Data from Social Media
- Tech Tools for the Investigators Toolbox
- Writing Legal Process for Digital Investigations
- Data in Data: Finding File Metadata and Using it in Investigations
- Triage Fundamentals: Windows Operating Systems
- Diligence, Digital Evidence, and Dumb Luck – The Investigation of Brenton Wade Richmond
- Capturing and Preserving Online Videos
- EXCELerate Your Investigations: Using Excel Effectively
- #howdoisearchthat: Leveraging Native Social Media Search Capabilities
- Digital Detective: Unleashing the Power of OSINT
- Introduction to Cybercrime Fundamentals
- I Want It That Way: Data Manipulation and Transformation
- Freeware Forensics: Prefetch File Analysis
- Freeware Forensics: Shellbags Artifacts
- Digital Defenses: Strategies for Officer Safety and Personal Cybersecurity
- The Predator with a Thousand Faces: A Case Study of The Gemini Predator
- What to Expect when You’re Expert-ing: Demystifying Expert Witnessing
- Pinning Down a Curator: Forensic Artifacts to Identify a Collector
- “Hands on {keyboard} Offenders”
- 5 Minutes Around The Reds: Identifying the Hands on the Keyboard
- Scripting in the Fast Lane: Writing Scripts with ChatGPT
- Now What? Digesting Electronic Search Warrant Returns
- Going Back in Timeline: Comprehensive Temporal Analysis
- Audio Overload? Automatied Transcription using Whisper
- Unraveling AI and the Technology That Makes Them Work
- Fortifying Your Fortress: Personal Cybersecurity Awareness
- AI Generated Media: Understanding “AIg CSAM” and Its Creation
- Investigating AIg CSAM: Working the Digital Forensics
- Practical Tools for Data Insights and Analysis
Practical Operational Assistance
Need assistance or have questions related to cybercrime investigations or digital forensics? We can help! Just fill out this form and we will get back to you by phone or email.