Home | Contact Us
Regional Computer Forensics Laboratory National Program Office

Course Descriptions


The following courses are available to all law enforcement personnel.

Classes

Click here to register for classes at your local RCFL.

Affidavit Workshop and Understanding the Forensic Report

This course discusses methodologies pertaining to search warrant preparation, affidavits that work, and search warrant execution. Because this portion of the course is unscripted, there is no set time limit. However, if time permits before 4:30pm, we will discuss the RCFL's forensics report, how to read it, and what it means. Those that attend both sessions are awarded certificates indicating a full day's attendance, but students can take either session independently. This course is available to credentialed law enforcement personnel only.

Case Agent Investigative Review

This 1-day course is for RCFL clients and is designed for investigators of Digital Evidence. The concepts of digital evidence forensics are discussed along with hands-on training with Access Data's Forensic Tool Kit (FTK). Investigators will learn software and hardware methods to allow for the expedient and thorough review of examination output and report building. The course is 50% FTK training and 50% practical exercises.
Prerequisite: By invitation only.

Internet Crimes and Tracing

This course cover presents an overview of the Internet; Internet Configuration - what it is, how it works, "surfing," E-mail & Internet Chat, reading e-mail extended message headers, how to track and trace suspects, legal and high tech search warrants & preservation letters, law related to high tech crimes, how to use and obtain investigative tools. Each student receives a resource CD containing tools, information and examples. Class sizes are limited to 25 students.

Image Scan Training

This software tool was created by members of the FBI’s Computer Analysis Response Team specifically for "knock & talk" situations relating to child exploitation investigations. Once deployed, the software quickly identifies and isolates images on a suspect’s computer and stores them on a thumb drive – without altering any files on the computer. ImageScan consists of a CD and a thumb drive. Read the ImageScan brochure.

Click here to read an ImageScan factsheet.

Webinar

Managing Digital Evidence in the 21st Century: What Every Peace Officer Must Know

Criminals and terrorists are increasingly tech-savvy. Are you? Register to view the Archive of the free Webinar that was offered on June 6, 2007. Registration takes just 60 seconds.



Home |  Sitemap |  Accessibility Statement  |  Privacy Policy