SEARCH

The National Consortium for Justice Information and Statistics

The National Consortium for Justice Information and Statistics

Search
Generic filters

Cybercrime & Digital Forensics

Through instructor-led training classes, as well as workshops provided at national or regional meetings or conferences, SEARCH trains practitioners in cybercrime and digital forensics. SEARCH also offers assistance to individual local, regional, tribal and state agencies nationwide that have questions or next help with cybercrime investigations or computer forensics. We offer assistance either on-site (we travel to you) or via email or telephone. We also offer a range of tools and resources to meet the needs of investigators.

Resources for Cybercrime and Digital Forensic Investigators

Instructor-Led Training

SEARCH offers its instructor-led courses as a training provider for the Internet Crimes Against Children (ICAC) Task Force Training Program, and directly to agencies and jurisdictions on a contract basis.

Course
Audience
Prerequisites
Length
Difficulty
 
Cybercrime Investigations: Leveraging Social Media and Open-Source IntelligenceAll investigators 3 daysBasic-to-intermediateCourse Details
Mobile Device Forensics for InvestigatorsAll law enforcement who work in ICAC, high-tech crime or other crimes that contain a digital component 3 daysBasic-to-IntermediateCourse Details
Freeware Forensics: From Acquisition to Analysis Using Free ToolsDigital forensic examiners in law enforcementFoundational background in digital forensics is recommended.3 daysIntermediate-to-AdvancedCourse Details
Peer-to-Peer InvestigationsAll cybercrime investigatorsBackground in online investigations; Understand and have experience with the basic computer crime scene.2.5 daysIntermediate-to-AdvancedCourse Details
Digital Forensics for ProsecutorsAll prosecutors who work in ICAC, high-tech crime or other crimes that contain a digital component 3 daysBasic-to-IntermediateCourse Details
Cybercrime Investigations for ProsecutorsAll prosecutors who work in ICAC, high-tech crime or other crimes that contain a digital component 3 daysBasic-to-IntermediateCourse Details

Modular Course and Conference Blocks

SEARCH can tailor our curriculum into shorter, condensed versions that fit into your meeting or conference needs. Take a look at our individual course blocks and let us know how we can help. Conference Block Sessions

  • Freeware Forensics: Leveraging Free Tools for Digital Forensic Analysis
  • Fundamentals of Cybercrime Investigations
  • Safe Sandboxing: Using Virtual Machines and Emulators
  • OSINT Techniques for ICAC Investigations (or sometimes shortened to just OSINT for ICAC)
  • Become a Google Jedi: Building a Better Boolean String
  • Using Google Earth to Plot Geolocation Points, Create Maps, and Visuals
  • Technology Artifact Awareness: The 4th Dimension of Crime
  • Scrolling with Purpose: Mastering the Art of Social Media Searching
  • Handheld Evidence: Terminology, Seizure Considerations, Understanding Mobile Forensic Reports, and Manipulating Report Data
  • CSAM Ransomware: Case Study
  • What Breadcrumbs Are You Broadcasting: Digital Officer Safety
  • Who’s the MAC: MAC Address Device Identification and Geolocation
  • You Down With OPP (Other People’s Python)?
  • Fortifying Your Fortress: Personal Cybersecurity Awareness
  • Darknet Fundamentals
  • Saving Data from Social Media
  • Tech Tools for the Investigators Toolbox
  • Writing Legal Process for Digital Investigations
  • Data in Data: Finding File Metadata and Using it in Investigations
  • Triage Fundamentals: Windows Operating Systems
  • Diligence, Digital Evidence, and Dumb Luck – The Investigation of Brenton Wade Richmond
  • Capturing and Preserving Online Videos
  • EXCELerate Your Investigations: Using Excel Effectively
  • #howdoisearchthat: Leveraging Native Social Media Search Capabilities
  • Digital Detective: Unleashing the Power of OSINT
  • Introduction to Cybercrime Fundamentals
  • I Want It That Way: Data Manipulation and Transformation
  • Freeware Forensics: Prefetch File Analysis
  • Freeware Forensics: Shellbags Artifacts
  • Digital Defenses: Strategies for Officer Safety and Personal Cybersecurity
  • The Predator with a Thousand Faces: A Case Study of The Gemini Predator
  • What to Expect when You’re Expert-ing: Demystifying Expert Witnessing
  • Pinning Down a Curator: Forensic Artifacts to Identify a Collector
  • “Hands on {keyboard} Offenders”
  • 5 Minutes Around The Reds: Identifying the Hands on the Keyboard
  • Scripting in the Fast Lane: Writing Scripts with ChatGPT
  • Now What? Digesting Electronic Search Warrant Returns
  • Going Back in Timeline: Comprehensive Temporal Analysis
  • Audio Overload? Automatied Transcription using Whisper
  • Unraveling AI and the Technology That Makes Them Work
  • Fortifying Your Fortress: Personal Cybersecurity Awareness
  • AI Generated Media: Understanding “AIg CSAM” and Its Creation
  • Investigating AIg CSAM: Working the Digital Forensics
  • Practical Tools for Data Insights and Analysis

Practical Operational Assistance

Need assistance or have questions related to cybercrime investigations or digital forensics? We can help! Just fill out this form and we will get back to you by phone or email.

Scroll to Top