Law Enforcement Agents receive training every year from other law enforcement officers and outside consultants. In our technology driven world, technology is ever-changing and therefore is the driving force of the content of this course. For this reason our course offers the most up to date information based on current cyber-crime and high-tech activity.

The cases used in this course are based on crimes that include Cyber Blackmail, Cyber Extortion, Cyber Bullying, Hacking, Sextortion, Identity Theft, Cyber Fraud, Online Dating Fraud and other types of cyber-crime. This course has been used in training Local, State and Federal Law Enforcement such as FBI, DEA, ATF, IRS, US Marshals, US Air Marshals, Homeland Security, Inspector General’s Office to just name a few. 


This course educates law enforcement officers on how to think like hackers as well as how to identify the tools that hackers use to commit attacks.


This course has been used in training Local, State and Federal Law Enforcement such as FBI, DEA, ATF, IRS, US Marshals, US Air Marshals, Homeland Security, Inspector General’s Office to just name a few.


Things Law Enforcement Can’t Do That Others Can

  • Law Enforcement and Personal Social Media Accounts
  • What Your Family Members Can Do That Can Get You in Trouble
  • Rules to Dating Online
  • Buying Homes and Cars in Your Name


Website Intelligence 

  • Learn How to Use and Configure the Web Data Extractor Tool
  • Learn How to Extract Phone Numbers From a Target Website
  • Learn How to Extract Fax Numbers From a Target Website
  • Learn How to Extract Email Addresses From a Target Website
  • Learn How to Find Every URL on a Target Website
  • How to Get Usernames From a Website Without Hacking
  • How to Get Passwords From a Website Without Hacking
  • How to Get Email Lists/Addresses From a Website Without Hacking
  • How to Get Sensitive Documents From a Website Without Hacking
  • How to Get Financial Information From a Website Without Hacking
  • Find a Websites vulnerabilities
  • Monitor Any Website
  • How to Bypass the Google Custom Search Filter to Access all of Google's Databases
  • How to Search all of Google at Once for Vulnerabilities
  • How to Search Specific Websites for Vulnerabilities
  • How to Add a Proxy to Hide Where Your Searches Originate From
  • How to Determine if There are Any Hidden or Restricted URLs in a Website
  • How to Scan Files You Have Downloaded for Personally Identifiable Information Such as Credit Card Numbers, Social Security Numbers, and Patient Records
  • How to Use Google to Scan for Websites With Open Ports
  • How to Use "NotInMyBackyard" to See if Someone’s Name, Username, Social Security Number, or Any Other Personally Identifiable Information Has Been Posted on a Public Website or Into Cloud Storage
  • How to Look for a Malicious Executable File in Websites
  • Learn How to Find the List of IPs That a Target Website is Using
  • Learn How and Why to Use the Wayback Machine to View Old Copies of a Website
  • Use the Netcraft Tool to Find all URLs in a Target Website and What Operating Systems the Website Uses
  • How to Discover Which of Your Devices are Connected to the Internet, Where they are Located and Who is Using Them
  • Keep Track of all the Computers on Your Network That are Directly Accessible From the Internet
  • Learn How to Understand a Targets Digital Footprint
  • Learn How to Find Every URL on a Target Website
  • Learn How to Mirror a Website
  • Learn How to Configure the Settings for Maximum Data Gathering
  • Learn What you Can do With a Mirrored Website
  • How to Find Almost Anyone in the World Online
  • How to Build Fake Profiles to Create a New Social Media Profile or Cyber Space Identity
  • How to Create Sock Puppets/Fake Accounts
  • How to Tell the Difference Between Real News and Fake News
  • How People Create Fake News



How to Track a Cyber Criminal / Identity Thief

  • How to Track an Email Legally Without a Subpoena
  • How to Spoof Emails Without Any Special Software
  • How to Track a Cyber-Criminal Via Skype



Credit Card / Check Fraud:

  • Five Ways Credit Card Thieves Steal Credit Card Numbers Without Getting Caught
  • How to Clone Credit Card Numbers in Minutes
  • Where Thieves Browse Online to Buy, trade, and Sell Credit Cards


The Inside Man:

  • How to Profile an Employee of a Company who is Stealing Information
  • How to Tell if a Crime is an Inside Job


Hacker for Hire Service:

  • What Are the Top 5 Hacker for Hire Requests From Consumers and Businesses
  • Who is Requesting the Most Services
  • The Top 5 countries That are Hiring Hacker for Hire Services
  • Why Should Law Enforcement Team Up With Hacker for Hire Service



Telephone Spoofing:

  • How Criminals Use Spoof Email to Check Voicemails
  • How Criminals Spoof Telephone Numbers
  • How Criminals Make Untraceable Telephone Calls
  • Identifying Telephone-Spoofing Companies and Which Ones are Law Enforcement Friendly
  • What Law Enforcement Needs to Know About Issuing a Subpoena to a Spoofing Company


Online Sex Trafficking


  • The Booming Industry of Sex Trafficking Via the Internet
  • How International Agreements Address the Problem and Fail to Go Far Enough 
  • Investigating Sex Trafficking on Facebook
  • Sextortion 



Hacking Hospitals and Health Care Facilities


  • Learning the Mistakes Hospital Executives Make
  • Protection From Hacking and Ransomware
  • Choosing the Right IT Professionals
  • How you Can Tell in 15 Minutes if Your Organization Can be Hacked
  • Verifying in 15 Minutes That Your Organization is HIPPA Compliant
  • What Damage Can Hackers or Cyber Terrorist Do to Your Organization



Cyber Awareness For C-Level Executives (CEO’s, COO’s, CFO’s..)


  • The Mistakes Every Boss Makes
  • What Your IT Department Will Never Tell You
  • The Top 10 Things that Proves if You and/or Your Organization is Hacker Proof



ACTIVE SHOOTER/WORKPLACE VIOLENCE SEMINAR


·Active Shooter – How to Survive

·The Respectful Workplace: Recognition, Prevention and Indicators or Workplace Violence

·How to Respond to Active Shooter in Your Vicinity (not in your building)

·How to Respond when Law Enforcement arrives

·Leadership Responsibilities: Human Resources and Facility Manager

·Handling Special Needs Individuals during an Active Shooter Situation

·How to Develop an Emergency Action Plan (EAP)

·Active Shooter Training Exercises


This course is taught by retired Federal Agent Michael Williams.  


Mike Williams is a retired Federal Agent who worked in law enforcement for over 25 years. He is a graduate of the US Army Command and General Staff College, where he earned a Master’s degree in Military Arts and Science.


 When airline hijacking became a problem for domestic airlines in 1981, Mike served as a US Air Marshal. During his tenure, Mike experienced the challenges that flight attendants face when dealing with tense situations during flights. Mike took part in joint operations with elite counterterrorism units: Israel’s Masaad and Germany’s Special Polezei. Mike was a Certified Military Police Working Dog Handler and has worked in both domestic and international airports.


 As a Certified TSA (Transportation Security Administration) trainer, Mike trained hundreds of security supervisors and screeners across the country. Mike also traveled around the country testing TSA supervisors and screeners. Mike was also instrumental in the implementation of the newest anti-hijacking software which was approved by the TSA. He trained airline pilots and FAA inspectors in the correct use of this groundbreaking software.


 Mike is the recipient of two Bronze Stars for heroism. And has three (3) combat tours to his credit.


 He is also a federally certified Polygraph Examiner and State of Georgia Security Officer Classroom Instructor and Firearms Instructor.


 Finally, Mike is the author and former Adjunct professor for Ashworth Colleges Aviation Security undergraduate program and the author of the public safety book, “Stay Alert! Stay Alive!


 Criminals Reveal Their Secrets. Mike has been working in private security for the last 18 years. Mike is currently the Senior Director of Security for Chesley Brown International.



This Class Is Perfect For

  • Criminal Justice Students
  • Private Investigators
  • Law Enforcement

If Your Law Enforcement

Contact Us For More Details.

Contact Us