School Threat Assessment and Digital Intelligence

Date: 26 - 28 Mar 2019 Days: Tue-Thu Hours: 9:00 AM - 5:00 PM
Course type: Instructor Led
Region: North America
Location: Montgomery, AL, United States
Capacity:Few seats left
Enroll by: 26 Mar 2019
Log in to see the options to register for this course. If you do not already have an account, create your FREE account. Creating an account does not obligate you to enroll or pay for classes.

About this course

Description
The Threat Assessment and Digital Intelligence Course (TADI) is a three-day beginner-level course that exposes school administration staff, private security and commissioned/non-commissioned law enforcement personnel to the numerous threats impacting our schools today. This course was designed to meet the specific needs of the School Resource Officer, school administrator, school counselor, contract security, campus police and teacher. Working in a campus environment presents a unique set of challenges, many of which are magnified by digital devices in the hands of impulsive young adults. This three-day course focuses on campus safety and the role technology plays in intelligence assessments and criminal investigations. Participants will become familiar with mobile device and computer technology and how to quickly access pertinent data in an emergent situation. Participants will also learn the integral part Social Media plays in the communication process and how that information can be accessed and leveraged to prevent or mitigate threats. Finally, participants will learn how to locate, identify and assess mobile and web-based information so it can be leveraged as actionable intelligence in the emergence of or prevention of school-related threats.

Course-description_TADI_Mar2019(EN) (002).pdfCourse-description_TADI_Mar2019(EN) (002).pdf
Learning objectives

Upon successful completion of this course, the student will be able to:

  • Demonstrate best practices for the on-scene identification, collection, packaging, transporting, examination and storage of digital evidence data and devices.
  • Demonstrate best practices when conducting SIM card, SD card, and cell phone extractions and examinations.
  • Identify functions to perform supported data extractions.
  • Exhibit how to use current technology to open extractions of data.
  • Summarize how to conduct basic searches using current technology.
  • Exhibit how to create investigative reports.