Skip available courses

Available courses

Cell phones, computer tablets, portable video game units and personal navigation devices are everywhere – every criminal, victim, and witness to a crime today is carrying at least one handheld mobile device. Each of these devices may contain valuable evidence that you may have to access or analyze as part of a crime investigation or prosecution.

Drakontas, in partnership with Drexel University and BKForensics, has developed a free, online training program to help criminal justice professionals throughout the United States address the challenges handheld technologies present to crime and investigations.

Materials include:

Essentials: covers the basics for identifying various handheld devices, related physical evidence (such as memory and storage cards, peripherals), proper seizure methods, secure transport and storage, evidence analysis requests, and testimony strategies. We recommend that every officer in your jurisdiction take this “Essentials” course irrespective of their job description, as all officers are going to need to know what is in this portion of the course.

Technology Briefings: includes dozens of briefings regarding individual devices, their capabilities, and the technologies behind them, such as GPS, mapping, operating systems, and hardware components. These briefings are built for officers with an interest in technology and a desire to know more about how handheld devices are changing the criminal work and investigatory landscape.

Information Gathering Strategies: looks more deeply at the handheld devices themselves and the kinds of information an investigator can find on the device. These can include everything from calendaring systems, to images, location tracking, social networks, games and mobile apps. The goal of this block is to help investigators ask the right questions and find information more rapidly to expedite the investigatory process.

Specialized Criminal Justice Issues: addresses the complexities facing law enforcement due to the rise of new crimes and criminal techniques relating to handheld devices, including identity theft, texting while driving, online harassment, stalking, cyberbullying, homicide, theft, and new criminal coordination techniques.

The Basic Computer Skills for Law Enforcement course (a collaboration by the National White Collar Crime Center, the Internet Crimes Against Children Task Force Program, and SEARCH, The National Consortium for Justice Information and Statistics) provides prerequisite computer skills training for investigators.

This online training course covers the aspects of conducting an investigation using social networking websites. Topics include: a brief introduction and overview of social networking websites; dissecting a social networking website profile; creating a social networking website profile; how to search social networking websites; and how to capture a page for investigative purposes.


Many of the attributes of the Internet and other telecommunications technologies, including its low cost, ease of use and anonymous nature make it an attractive medium for fraudulent scams, child sexual exploitation, gang violence, hate crimes, cyber stalking and bullying. These are just some of the issues encountered by law enforcement on a daily basis. This course introduces investigators to networking, lays the groundwork for how the Internet works, and shows how to determine the legal compliance resources for an IP address and a domain name.

This certification training provides new JIEM users with complete instructions to leverage the new features in the JIEM Tool.


This comprehensive web presentation series is designed to provide public safety practitioners with knowledge in the emergency communications field to assist them in making informed decisions. This presentation series introduces public safety practitioners to six current and relevant subjects impacting public safety communications projects and system issues.

Each subject in the series is less than 30 minutes in length and is designed under the assumption that listeners may represent mid-level managers or individuals coordinating public safety communications projects and interoperable communications at the local/regional/or state level. Listeners may also represent someone that is responsible for planning and operating interoperable public safety systems within their agency. Examples include project managers, elected officials, board members, emergency management, or personnel within planning sections of their agency of department. The series material was developed to provide an overview of each subject with the opportunity to seek additional training in subjects of particular interest.


Through this course, students will learn about the top ten public safety project management success factors, view and discuss relevant audio-visual materials, and work with four critical project tools. Students will also participate in breakout and self-assessment activities.

The course is scheduled to be four (4) hours in length and was designed under the assumption that students have a minimum of 5–10 years of experience in public safety and have some accountability for public safety projects within their organization. The course material was not developed to substantively delve into the basics of project management or provide step-by-step instructions for deploying the critical factors; rather, this is a course focusing on the duties and responsibilities of a senior-level public safety professional as they relate to executive sponsorship and improving project success.