Courses
Discover thousands of courses from top institutions and platforms worldwide
Level
Course Type
Duration

Study.com
Get caught up in class or learn something new about law enforcement with our informative and helpful Introduction to Law Enforcement course. Short video and text lessons present the important topics you need to know in order to get a great score on a test or have a working knowledge of the criminal justice system.

Udemy
Understanding what de-escalation is, how to use it without jeopardizing officer safety in the process. What you'll learn: Understand the importance of deescalation and know how to apply it to their job.The participant will understand how stress can affect the decision making process. The participant will learn key words and facial expressions indicative of an imminent threat.The participant will define the term de-escalation.The participant will better understand when to use force and what other techniques can be used to de-escalate situations.The participant will understand how their voice can be important when dealing with people. This course is geared towards law enforcement. It presents different techniques and communication skills an officer can use to de-escalate a situation without compromising officer safety. This course utilizes some of the most up to date videos to show both good and not so good efforts of de-escalation. As we have seen, just because we are within law and policy does notnecessarily result in a positive outcome in the eyes of the public. Using these skills, officers can minimize risk to themselves as well as the suspect. They can also have the most positive outcome/interaction in the eyes of the community, avoiding bad press.Ideveloped this course with the assistance of Thomas Gleason. Thomas Gleason, a retired Captain, spent thirty years serving in city, county and state law enforcement. He began his career in Alabama as a patrolman in New Brockton, Alabama. He then moved to Florida and accepted a position as a Sheriff’s Deputy in Polk County, where he became a member of the Emergency Response Team (SWAT). This lead to a position with the City of Lakeland where he gained experience as a patrolman, a patrol supervisor, a field training officer, a School Resource Officer, and a Detective Sergeant over the missing persons, juvenile crimes, and sexual abuse crimes unit, Shocap programs.. In 1999, he developed and delivered a presentation entitled “Law Enforcement’s Response to Critical Incidents at Schools and Ways to Handle Critical Incidents” to the Florida Department of Education Statewide Safety Summit. While working with the City of Lakeland he also assisted in founding the Domestic Abuse Response Team, was one of the first officers in the Lakeland Community Oriented Policing Program, served as Chairman of the District 14 Juvenile Justice Board, served as Chairman of the Polk County Juvenile Justice Counsel, and served as the Second Vice-President of Florida Association of School Resource Officers from 1997-2000. In 2000, he was chosen as part of a team to teach Dynamics of Domestic Violence to Moldavian police officers and volunteers. In 2001 he attended Crisis Intervention training and developed and taught the City’s in-service training to all sworn officers. He then expanded his experience by accepting a position with Florida Department of Law Enforcement, Capitol Police, as their Lieutenant of Special Operations. In this position he supervised the Capitol Police Canine Unit, Explosives Unit and the Investigations Unit. He also coordinated training, recruiting, and hiring of new officers. He trained officers with Capitol Police in the areas of proper critical incident response, use of firearms, and observing and eliminating armed security threats. During his tenure there he was involved in drafting and implementing the Capitol Complex Operations Plan for former Governor Jeb Bush’s 2003 inauguration and in preparing the Operations Plan for the visit by Prime Minister Benjamin Netanyahu and his security detail. In 2009 he was a subject matter expert on the Florida Department of Law Enforcement’s Standards and Training Commission Committee which was tasked with reviewing and revamping the Basic Recruit Training Curriculum for the State of Florida. In 2009, the Florida Department of Financial Services offered him a position as Captain over training and acquisitions. He accepted this position and became responsible for developing and overseeing training for the one-hundred and fifty detectives working throughout the State of Florida who investigate insurance fraud. During his tenure there he oversaw the transition from Sig. Sauer 9 MM to Glock .40 caliber and the training of all officers after the transition. His passion for law enforcement training also led him to the position of Coordinator of the Law Enforcement Academy for the Florida Public Safety Institute from 2006-2009. In 2014, he was an instructor at the High Liability Instructor’s Conference held at Florida Public Safety Institute teaching Handling Veterans, Officer Safety Response, and Managing a Training Unit. He has been an instructorfor the Florida Public Safety Institute, Department of Justice in the Valor program. He has experience teachingin the areas of: human diversity; patrol procedures; first aid; firearms; police pursuit policies; instructor techniques, and handling the mentally ill, police officer safety, De-escalation Skills. Thomas Gleason holds a Bachelor’s Degree in Criminal Justice and a Master’s Degree in Education. He has published two articles dealing with police training and domestic violence.

Coursera
Have you ever wondered how a police officer in Europe can obtain evidence from a cloud provider in the USA? Or whether a major cloud provider might abuse its market power? Or in which countries cloud providers pay taxes? If so, then this course is for you! First, we’ll look at how law enforcement agents can request access to cloud data, including data stored outside their borders. You’ll learn to advise cloud providers on responding to access requests and on dealing with potential conflicts with European Union (‘EU’) data protection law. Second, we’ll cover EU competition law, including how to define the relevant market for cloud services and to assess market power. You’ll learn to identify when cloud providers might be found to have entered into anti-competitive agreements, or to have abused a dominant position in a market. Third, we’ll look at how the income from cloud services is taxed. We’ll cover how such income is classified and which countries have the right to tax cloud providers. You’ll learn how tax principles apply to cloud services today, and how this might change in future. In short, we’ll cover how the rules of law enforcement access, competition law, and tax law apply to cloud services – and you’ll discover the practical steps that cloud providers can take to comply with their obligations.

YouTube
Explore the intersection of blockchain technology, privacy concerns, and law enforcement challenges in this informative 57-minute session. Delve into the complexities of maintaining individual privacy while addressing the needs of law enforcement in the context of blockchain systems. Gain insights into the potential conflicts between privacy-preserving technologies and regulatory requirements, and examine potential solutions for balancing these competing interests. Discover how blockchain's transparency and immutability impact both privacy protection and criminal investigations, and consider the implications for future policy and technological developments in this rapidly evolving field.

YouTube
Explore the complex landscape of law enforcement data requests and corporate disclosure obligations in this 20-minute conference talk from PEPR '25. Examine how the phrase "law enforcement response" encompasses various legal processes including wiretap orders, pen register orders, lawful intercept requests, emergency disclosure requests, and national security letters, while understanding why these processes are deliberately opaque and resist comprehension. Learn about the concept of "surveillance intermediaries" coined by Lawfare fellow Alan Rozenshtein and discover how these entities serve as crucial links between law enforcement and data access. Analyze the standardization opportunities available for basic information requests like subpoenas and warrants, and understand the increasing risks posed by aggressive nation-state intelligence operations targeting sensitive corporate infrastructure. Gain insights into practical strategies that privacy professionals can implement to better defend surveillance intermediaries and their critical systems, while navigating the intersection of data privacy, legal compliance, and national security concerns in the modern digital landscape.

YouTube
Explore a 49-minute Black Hat conference talk detailing the takedown of Avalanche, a sophisticated cybercriminal infrastructure. Delve into the highly secure network of servers that allegedly facilitated malware campaigns and money laundering schemes, resulting in hundreds of millions of dollars in losses and over 500,000 infected systems worldwide. Gain insights into the law enforcement operation that dismantled this extensive criminal enterprise, as presented by Tom Grasso. Discover the challenges faced and strategies employed in this landmark case that significantly impacted the landscape of cybercrime and international law enforcement cooperation.

YouTube
Explore alternative strategies to combat cybercrime beyond traditional law enforcement methods in this 48-minute conference talk from BSidesLV. Examine the limitations of the "hammer" approach of arrests and infrastructure takedowns, and delve into softer, more innovative tactics. Analyze the economics of cybercrime and identify potential levers to disrupt illegal operations and reduce market efficiency. Consider how law enforcement and industry partners can strategically "play games" with cybercriminals to achieve long-term impact in the fight against digital threats. Join Jonathan Lusthaus as he presents fresh perspectives on addressing the persistent and evolving challenges of online criminal activities.

YouTube
Attend a thought-provoking breakfast discussion on building a culture of cybersecurity hosted by The Aspen Institute's Cybersecurity & Technology Program. Explore how organizations and government can better understand cyber risks and create an institutional culture focused on security. Join moderator John Carlin, Aspen Cyber Chair, as he leads a panel featuring Rep. Will Hurd (R-TX), FBI Associate Deputy Director Paul Abbate, and McAfee Chief Technology Officer Steve Grobman. Gain insights from these experts on critical cybersecurity issues, including threat assessment, risk management, and institutional strategies for enhancing digital security. Learn about the latest developments in cybersecurity policy, technology, and best practices from leaders in government, law enforcement, and the private sector. Discover how to protect your organization from cyber threats and create a more secure digital environment.

YouTube
Explore a powerful TEDx talk by Baton Rouge City Police Chief Murphy Paul Jr. as he shares his personal journey and unexpected reunion with a childhood friend at Louisiana State Penitentiary. Discover how the "Three F's" - Faith and Family First - play a crucial role in transforming lives and communities beyond traditional law enforcement methods. Gain insights into Chief Paul's extensive law enforcement career, including his efforts to combat racism while reducing crime rates in a predominantly Black city. Learn about his experiences as a Black police chief and his involvement in various law enforcement boards and initiatives. Understand the importance of balancing faith, family, and community engagement in creating positive change and fostering stronger relationships between law enforcement and the public.

YouTube
Explore the complex landscape of digital trails in law enforcement through this insightful 20-minute talk by Dr. Rakshit Tandon. Delve into the challenges faced by law enforcement agencies (LEA) in navigating vast amounts of electronic data, including privacy concerns, legal issues, and the need to keep pace with rapidly evolving technology. Discover the unprecedented opportunities digital trails offer for criminal investigations and gain valuable insights into the future of digital forensics in law enforcement. Learn how LEAs can leverage these digital footprints while addressing the associated complexities in modern criminal investigations.

YouTube
Discover the inspiring journey of Manjari Jaruhar, one of India's first female IPS officers, in this powerful TEDx talk. Explore how mental integrity, humility, and passion can break barriers and pave the way for women in traditionally male-dominated fields. Learn valuable lessons on turning challenges into opportunities and thriving in the face of adversity through Jaruhar's firsthand experiences in handling complex Indian crime cases. Gain insights into the transformative impact one dedicated individual can have on society and be inspired to climb the ladder of success with determination and ownership. This talk offers a unique perspective on gender issues in law enforcement and demonstrates the power of perseverance in achieving groundbreaking success.

YouTube
Explore the complex system of law enforcement during the Han dynasty in this 18-minute video lecture. Delve into the delicate balance of power between the imperial center and local nobility across the vast Han empire. Examine the tension between loyalty to bloodlines and loyalty to the emperor, and learn about significant events like the Rebellion of the Seven States. Discover how the Han dynasty managed to enforce rule of law over its extensive territories for more than 400 years, and gain insights into the factors that led to the end of the Western Han's golden age. This video is the second part of a two-part series on the Han dynasty, offering a comprehensive look at the challenges of governance in imperial China.

YouTube
Explore law enforcement paradigms to evolve information security practices and reduce operational noise in this conference talk from Converge 2016. Learn about effective detection methods, including event classification, triage prioritization, and suspect-centric investigations. Discover how to implement host analysis, connect facts, and develop new hypotheses using Modus Operandi modeling and link analysis. Gain insights into creating evidence boards, utilizing bioinformatics tools like Cytoscape, and identifying patterns to separate signal from noise in security operations.

YouTube
Explore a thought-provoking DEF CON 31 conference talk that delves into the critical intersection of digital privacy, law enforcement, and reproductive rights in a post-Dobbs landscape. Learn how personal data from health and lifestyle apps can be extracted and used in criminal investigations, with detailed demonstrations of forensic extraction tools and their capabilities. Understand the limitations of Fourth Amendment protections in the digital realm, examining real search warrant examples that highlight the ease with which law enforcement can access private health information. Gain insights into the technical aspects of digital surveillance, including the practical methods used to review sensitive data and the challenges in interpreting this information. Discover the concerning reality of how everyday digital footprints can be leveraged by authorities, with special attention to reproductive health data and broader implications for personal privacy in the modern age.

YouTube
Explore the critical intersection of global terrorism and local law enforcement in this 49-minute panel discussion from The Aspen Institute. Delve into the challenges faced by state and local police in the era of ISIS, where national security, homeland security, and public safety converge. Learn about the technology, information, and resources needed by law enforcement to address this complex battle effectively. Gain insights from experts Jane Harman, Mitch Landrieu, and Roberto Villaseñor, moderated by Michelle Miller, as they discuss topics such as self-radicalization, training, community engagement, and potential solutions. Examine the role of the US Congress, the "No Fly No Buy" policy, and the importance of interfaith dialogue in addressing these challenges. Understand the misalignment between current approaches and the evolving threat landscape, and explore strategies to better equip local law enforcement for their pivotal role in national security.

YouTube
Explore the groundbreaking journey of radio jailbreaking that led to the first public disclosure and security analysis of the proprietary cryptography used in TETRA (Terrestrial Trunked Radio). Delve into the process of uncovering the secret algorithms that have remained hidden for over two decades, bound by restrictive NDAs. Learn about the reverse-engineering techniques and exploitation of zero-day vulnerabilities in the Motorola MTM5x00 TETRA radio and its TI OMAP-L138 trusted execution environment. Discover the challenges faced in side-channel attacks on DSPs, writing decompilers for complex DSP architectures, and exploiting ROM vulnerabilities in the Texas Instruments TEE. Gain insights into the critical importance of this technology, widely used by government agencies, emergency services, and in industrial environments, and understand the implications of its security analysis.

YouTube
Explore a 16-minute ACM conference talk examining a novel causal framework for analyzing racial bias within law enforcement systems. Join researchers Jessy Xinyi Han, Andrew Miller, S. Craig Watkins, Christopher Winship, Fotini Christia, and Devavrat Shah as they present their theoretical approach to evaluating and understanding systemic racial bias in policing and law enforcement practices.

Udemy
Everything You Need to Know About the Role What you'll learn: An understanding of who the Chief of Staff reports to at companies of various sizes and maturity (and what’s typical or more rare)The difference between a Chief of Staff and Executive AssistantWhat a typical day looks like in the “Life of a Chief of Staff”A step-by-step walkthrough and evaluation of Chief of Staff job descriptions from pre-seed to public companiesA deep dive into various career paths available to Chiefs of StaffQuotes from current and former Chiefs of Staff on what they wish they knew going into the roleHow to determine if the Chief of Staff role is right for you through custom, step-by-step guidesA deeper appreciation for the nuances of the role based on on-the-job experiences Are you a startup founder or CEO looking to hire an all-star Chief of Staff? Or are you an aspiring Chief of Staff, but don’t know where to start to learn more about the role? The truth is, most people – founders, CEOs, and aspiring candidates alike – are in the dark about what a Chief of Staff really does day-to-day. As a full-fledged member of the senior leadership team, the Chief of Staff is a critical hire to get right, and a great candidate in this role is the key that unlocks a high-functioning leadership team and helps to accelerate the company’s growth. What if I told you that there was one place where you could learn everything you need to know about the Chief of Staff role? This includes things like a fundamental understanding of the role and day-to-day responsibilities, how much Chiefs of Staff get paid, typical career paths for Chiefs of Staff, real on-the-job case studies… Well, you’re in luck! All the information and advice in this course are the products of years of experience on the job from real Chiefs of Staff, as well as Founders and CEOs of tech companies backed by top-tier venture firms like 8VC, Founders Fund, CAVU Venture Partners, Bedrock Capital, Slack Fund, First Round, and Felicis Ventures who have hired or worked with Chiefs of Staff. This course offers all of the above, AND:An understanding of who the Chief of Staff reports to at companies of various sizes and maturityThe difference between a Chief of Staff and Executive AssistantA breakdown of a typical day in the “Life of a Chief of Staff”A step-by-step walkthrough and evaluation of Chief of Staff job descriptions from seed to public companiesReal examples of career paths after the Chief of Staff roleReal quotes from current and former Chiefs of Staff on what they wish they knew going into the roleCustom, step-by-step guides for aspiring Chiefs of Staff to determine your interests and strengths, how well they align with key traits of a Chief of Staff, and if the Chief of Staff role is right for you (and what you should look for in a candidate if you’re hiring one)A deeper appreciation for the nuances of the role based on on-the-job experiences PLUS, SPECIAL EXTRA MATERIAL!An exclusive interview with Scott Britton, Co-Founder of Troops (acquired by Salesforce) on what he looks for in a great Chief of StaffQuotes from Founders and CEOs of companies backed by top-tier venture firms on the value of having an all-star Chief of StaffAn opportunity to get your resume in front of companies who are looking to hire a Chief of Staff! What the course doesn’t offer:A step-by-step guide to crafting your resume or finding, applying to, and interviewing for a Chief of Staff roleA diagnostic tool for Founders/CEOs to figure out if or when to hire a Chief of StaffAdvice for Founders/CEOs on how to recruit a Chief of Staff Who the course is for:Aspiring chiefs of staffFounders and CEOs who want to learn more about the role from other founders and current Chiefs of StaffEmployees at companies that have a Chief of Staff role who want to transitionI will personally respond to any questions you may have as you go through the material so don’t worry if you're not sure how to take all of the information and apply it to your situation. So sign up now! Talk soon,Zaharo

YouTube
Explore the intricacies of Tetragon auditing and enforcement in this informative 35-minute conference talk presented by John Fastabend at a Linux Foundation event. Gain valuable insights into the mechanisms and applications of Tetragon's auditing capabilities, as well as its role in enforcing security policies within Linux environments. Delve into the technical aspects of this powerful tool and learn how it can enhance system monitoring and protection in modern computing infrastructures.

AWS Skill Builder
AWS SimuLearn is an online learning experience that pairs generative AI-powered simulations with hands-on practice to help individuals learn how to translate business problems into technical solutions through the simulation of dialog between a customer and a technology professional. AWS SimuLearn: Compliance Enforcement In this AWS SimuLearn assignment, you will review a real-world scenario helping a fictional customer design a solution on AWS. After the design is complete, you will build the proposed solution in a guided lab within a live AWS Console environment. You will gain hands-on experience working with AWS services, using the same tools technology professionals use to construct AWS solutions. How does it work? AWS SimuLearn is powered by generative AI that enables you to have life-like conversations with AI customers. Your responses to the AI are evaluated to help develop your soft skills like communication. and problem solving. As you provide the correct responses, a quiz agent with test you and you can also get help from Dr. Newton, the helper agent when you get stuck. Once you provide all of the correct responses for the solution you will move to building it and validating in a live AWS Console environment. AWS SimuLearn: Compliance Enforcement - Services Used Compliance Enforcement AWS Config, AWS Systems Manager