(Certificates of ISS Technology Training Available Upon Request)
Special Training Seminars (24 class room Hours) Led by police force Officers and Ph.D Computer Scientists
On the web personal Media and Web Investigations (6 class room Hours) Presented by: Charles Cohen, Vice President at NW3C, the nationwide White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
Professionals Guide to Web Investigations (6 class room Hours) Presented by: Mark Bentley, Communications information Professional, nationwide Cyber Crime police force, UK Police
Understanding Cellphone 2G, 3G, 4G and 5G Infrastructure, Intercept and Cryptography (2 class Hours) Presented by: Dr. Jerry Lucas, President, TeleStrategies
Understanding Cryptocurrency 101, DarkNet (TOR and TOR HS) and Defeating Encryption for Technical Investigators (4 class Hours) Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Issues and factors in Financial Crime Investigations (5 class Hours) Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC Mike is just A us federal law enforcement that is former Officer.
Top 20 Open supply Tools (OSINT) Used in Cybercrime Investigations (One class Hour) Presented by: Mark Bentley, Communications information Professional, nationwide Cyber Crime police, UK Police
(Certificates of ISS Tech Training Available Upon Request)
Monday, 28 October 2019
Seminar # 1 09:00-17:15
Online personal Media and Internet Investigations (6 class Hours) Presented by: Charles Cohen, Vice President at NW3C, the nationwide White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
This 1 time session provides an up-to-date comprehension of just just exactly how networking that is social work and just how members act and communicate. Attendees will discover exactly exactly exactly what info is available on various web web sites and just how to incorporate that information into unlawful investigations and intelligence analysis that is criminal.
Seminar # 2 9:00-17:15
Practitioners Guide to Web Investigations (6 class Hours) Presented by: Mark Bentley, Communications Data Expert, nationwide Cyber Crime police force, UK Police
The purpose of this one time seminar is always to just take the attendees through the fundamentals of knowing the Web, how to locate information, right through to the full comprehension of most useful training of a Internet investigator, having understanding and familiarity with most of the tools open to accomplish that. Its aimed mainly in the detective, delivered through the perspective of detective, to enable them to really have the methodology that is best and tradecraft to profile and get suspects.
It is solely police force just, as Practical examples, covert and methodology that is investigative tradecraft may be provided through the entire seminar.
Seminar # 3 9:00-10:00
Understanding Cellphone 2G/3G/4G Infrastructure and Law Intercept for Technical Investigators offered by: Dr. Jerry Lucas, President, TeleStrategies
This session presents just exactly what technical investigators must know about 2G/3G/4G technology infrastructure, Including: legal Interception of Voice, Data and Messaging, SIM Card Basics: Information Available (IMSI, Authentication Key, etc.) and Cryptography Algorithms (A3, A5 and A8) and monitoring objectives making use of CDR’s, SS7 Interconnect and IMSI Catchers and more.
Seminar # 4 10:15-11:15
Understanding 5G Infrastructure and legal Intercept alternatives for Technical Investigators delivered by: Dr. Jerry Lucas, President, TeleStrategies
This session is definitely an introduction to 5G and just what technical detectives must know including: Infrastructure distinctions with 4G-LTE and 5G, New broadcast Access Technologies, and Understanding IMSI Encryption influence on LI and SUPI and SUCI replacement
Seminar # 5 11:30-12:30
Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators delivered by: Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies
Seminar # 6 13:45-14:45
Cybercurrency 101: Introduction to What Technical Investigators Need to understand about Bitcoin and Altcoin Transactions, black internet Commerce and Blockchain Analysis offered by: Matthew Lucas (Ph.D, Computer Science), Vice President, TeleStrategies
This 101 training seminar can be an introduction to Bitcoin, the way the system can be used to guide activitiages which are criminale.g. Black Web) and why technical detectives need to comprehend the bitcoin that is basic device (Blockchain) to effectively beat twenty-first century crooks and terrorist actions. Particularly, this introduction to Bitcoin for technical detectives details:
- Bitcoin Fundamentals for Technical Detectives
- Understanding Bitcoin Infrastructure, Blockchain and Bitcoin Mining
- Just Exactly How Criminals and Terrorists Usage TOR and Black Internet
- Bitcoin Cryptography Demystified (For Non-Math Majors)
- Popular Altcoins employed by crooks together with brand brand New Challenges Facing Law Enforcement
Seminar #7 15:00-16:00
Research Techniques for Unmasking TOR Hidden solutions and Other black online Operations delivered by: Matthew Lucas (Ph.D, Computer Science), Vice President, TeleStrategies
TOR networks are notoriously good at hiding the identity that is online of, terrorists yet others that are as much as no good. One other part that gets less attention are TOR services that are hidden. They are services that leverage TOR’s anonymizing capabilities to mask the identification of criminally-hosted online solutions – developing the cornerstone of almost all gambling that is illegal, medication areas, son or daughter exploitation product, firearm product product sales, terrorism propaganda, and much more.
- How hides that are TOR addresses/identity/location
Tuesday, 29 October 2019
Seminar #8 13:00-17:00
Issues and factors in Financial criminal activity Investigations (3 class Hours) Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC Mike is A us that is former federal Enforcement Officer whom specialized in complex fraudulence and cybercrime investigations and presently provides training to enhance detection and investigations of fraudulence, cash laundering and counter terror finance.
In this seminar that is 1-day will talk about the tools and methods crooks utilize in addition to police force reaction. Each presentation defines different facets of monetary business and crime models employed by criminals in addition to police force practices and techniques to spot and disrupt them. We are going to discuss the essentials in criminal companies, key players, cash laundering, and trade-based cash laundering. We are going to explain exactly how information are present as cash is relocated all over the world and exactly how detectives could make use that is best for this knowledge. This training is aimed mainly during the detective and analyst, but in addition has application towards the police force, https://hookupdate.net/nl/iamnaughty-recenzja/ cleverness, and monetary regulatory community.