Improve your experience. We are very sorry but this website does not support Internet Explorer. We recommend using a different browser that is supported such as Google Chrome or Mozilla Firefox.

Investigating and Tracking Cyber Predators and Online Child Abuse Material

Description

Course Objectives and Agenda (CLICK HERE)

Please be aware that this class is a 16-hour training. Therefore, the training will be 8am-5pm local time each day.

 

 

Course Overview:

The cyber predator never sleeps and is constantly advancing with technology. Internet crimes against children are among the most under-reported and rapidly growing types of crimes.

 

This is an intense course that provides practical knowledge and skills to investigate and successfully prosecute cyber predators and child abuse material crimes. This course is packed with case studies and examples. This is a hands-on course, and it is recommended that participants bring a PC-based laptop, although it is not mandatory.

 

Participants will be able to:

  1. Understand and define the basic terms related to investigating child abuse materials and crimes, including cyber predators.

  2. Understand and explain IP addresses.

    1. Including dark web and virtual private networks (VPNs)

  3. Understand the dark web and how it is connected to child abuse materials.

  4. Learn about statistics and how child abuse materials are connected to other crimes, including organized crime.

  5. Describe the links between social networking sites and the acceleration of child abuse material.

    1. Telegram, Omegle, and more. 

    2. Chat investigations.

  6. Understand how predators locate and groom children.

  7. Learn how Covid-19 increased the spread of online child abuse and child abuse materials.

  8. Understand the role of sextortion and online gaming platforms.

  9. Examine the market for child abuse materials.

  10. Employ specific techniques and evolving tactics for successful cyber investigations.

  11. Learn how to intercept child abuse material digital evidence.

    1. Identify and confirm child abuse materials online.

    2. Learn the importance of securing metadata when intercepting evidence.

  12. Search and seizure protocols for child abuse materials.

    1. Seizing both electronic and physical evidence.

  13. Investigate both the cyber crime scene and the physical crime scene in increase prosecution.

  14. Understand the challenges created by cell phones and sexting.

  15. How to conduct peer-to-peer (P2P) investigations.

    1. Proactive chat investigations. 

Similar seminars

Mobile Phone Investigations and Cellular Record Analysis

ONLY SWORN LAW ENFORCEMENT, LAW ENFORCEMENT CRIME ANALYSTS, AND PRACTICING PROSECUTORS ALLOWED IN CLASS

More Information
Mobile Phone Investigations & Cellular Record Analysis

ONLY SWORN LAW ENFORCEMENT, LAW ENFORCEMENT CRIME ANALYSTS, AND PRACTICING PROSECUTORS ALLOWED IN CLASS

More Information
Call Detail Records & Geolocation Analysis of Mobile Phones

ONLY SWORN LAW ENFORCEMENT, LAW ENFORCEMENT CRIME ANALYSTS, AND PRACTICING PROSECUTORS ALLOWED IN CLASS

More Information
Mobile Phone Investigations and Cellular Record Analysis (Conference)

ONLY SWORN LAW ENFORCEMENT, LAW ENFORCEMENT CRIME ANALYSTS, AND PRACTICING PROSECUTORS ALLOWED IN CLASS

More Information

Press enter to see more results