Course Section:1920SYR APA-CIMSM-08OG
Availability (updated hourly):
Maximum number of candidates: 40.
The call comes in, "All units we have an active shooter at." or "We have a barricaded suspect with a gun." Hopefully your organization has been trained to deal with this type of incident. However, did you know that "real time" monitoring of these incidents on social media can produce and identify: - Witnesses that may never have been located using traditional investigative methods - Photos that may never have been located using traditional investigative methods - Video that may never have been located using traditional investigative methods Did you know that in many instances the suspect(s) and their friends and family communicate with each other? That they will often monitor and disclose police locations during these incidents? Automated Social Media Software will NOT Capture all of the Information Available! I have challenged two very popular software vendors and one admits that their software will only capture 5 - 10% of all geo-tagged comments and images while the other admitted to only 2 - 4%. Both of these companies charge up to $2000 / mnth for one single licence. We teach you to do the same thing - for free! I took their training and using my techniques I found just as much, or more, information than their software. Social media during these incidents should not be an after thought. There are many reasons why it is difficult to capture social media information after an event. I have been training organizations to recognize the importance of monitoring social media before, during and after an event in order to: - Protect the attendees - Capture and record real time criminal activity - Monitor the event before, during and after to determine the "sentiment" of the attendees and any possible disruption - Natural Disasters and Social Media - Time and again we have seen how phone lines become jammed and 911 operators become overwhelmed during natural disasters. Often times people trapped in buildings will tweet or post their location hoping that friends and family can find them. You owe it to yourself and your organization to be prepared! Evaluation Methodology: After each section there will either be a short quiz or scenario to reinforce the student's understanding of the concepts being taught. The final "exam" will be a realistic investigative scenario that the student may encounter and will require you to employ all of the modules covered in order to satisfactorily "solve" the file.
Credit Related Information:
This is an Industry Standard Credit.
What you will need for this course:
Students can register and begin the course at any time. Students work at their own pace meeting provided benchmarks.
Mark Fenton, Cyber Training
$400.00 + HST
|On-going||Off-Site and/or via Distance|
Sorry, no day / time information available.
Please note: Students are only able to register for a course after they have completed any of the pre-requisites listed above.
Please note: If English is not your first language, you are required to meet Holland College’s English proficiency requirements prior to commencing studies. Recognized English proficiency tests can be found at the following link: Language Skills