Tallo logoTallo logo

Courses

Discover thousands of courses from top institutions and platforms worldwide

16,736 Courses Found

Sort by:
  • Newest First
  • Highest Rated
  • Most Reviewed
  • A to Z
  • Z to A
  • Price: Low to High
  • Price: High to Low
  • Duration: Short to Long
  • Duration: Long to Short
Introduction to Law Enforcement course thumbnail

Study.com

Certificate

Introduction to Law Enforcement

Law
Constitutional Law
Legal System

Get caught up in class or learn something new about law enforcement with our informative and helpful Introduction to Law Enforcement course. Short video and text lessons present the important topics you need to know in order to get a great score on a test or have a working knowledge of the criminal justice system.

De-escalation for Law Enforcement course thumbnail

Udemy

Certificate

De-escalation for Law Enforcement

Law Enforcement
Criminal Justice
Law

Understanding what de-escalation is, how to use it without jeopardizing officer safety in the process. What you'll learn: Understand the importance of deescalation and know how to apply it to their job.The participant will understand how stress can affect the decision making process. The participant will learn key words and facial expressions indicative of an imminent threat.The participant will define the term de-escalation.The participant will better understand when to use force and what other techniques can be used to de-escalate situations.The participant will understand how their voice can be important when dealing with people. This course is geared towards law enforcement. It presents different techniques and communication skills an officer can use to de-escalate a situation without compromising officer safety. This course utilizes some of the most up to date videos to show both good and not so good efforts of de-escalation. As we have seen, just because we are within law and policy does notnecessarily result in a positive outcome in the eyes of the public. Using these skills, officers can minimize risk to themselves as well as the suspect. They can also have the most positive outcome/interaction in the eyes of the community, avoiding bad press.Ideveloped this course with the assistance of Thomas Gleason. Thomas Gleason, a retired Captain, spent thirty years serving in city, county and state law enforcement. He began his career in Alabama as a patrolman in New Brockton, Alabama. He then moved to Florida and accepted a position as a Sheriff’s Deputy in Polk County, where he became a member of the Emergency Response Team (SWAT). This lead to a position with the City of Lakeland where he gained experience as a patrolman, a patrol supervisor, a field training officer, a School Resource Officer, and a Detective Sergeant over the missing persons, juvenile crimes, and sexual abuse crimes unit, Shocap programs.. In 1999, he developed and delivered a presentation entitled “Law Enforcement’s Response to Critical Incidents at Schools and Ways to Handle Critical Incidents” to the Florida Department of Education Statewide Safety Summit. While working with the City of Lakeland he also assisted in founding the Domestic Abuse Response Team, was one of the first officers in the Lakeland Community Oriented Policing Program, served as Chairman of the District 14 Juvenile Justice Board, served as Chairman of the Polk County Juvenile Justice Counsel, and served as the Second Vice-President of Florida Association of School Resource Officers from 1997-2000. In 2000, he was chosen as part of a team to teach Dynamics of Domestic Violence to Moldavian police officers and volunteers. In 2001 he attended Crisis Intervention training and developed and taught the City’s in-service training to all sworn officers. He then expanded his experience by accepting a position with Florida Department of Law Enforcement, Capitol Police, as their Lieutenant of Special Operations. In this position he supervised the Capitol Police Canine Unit, Explosives Unit and the Investigations Unit. He also coordinated training, recruiting, and hiring of new officers. He trained officers with Capitol Police in the areas of proper critical incident response, use of firearms, and observing and eliminating armed security threats. During his tenure there he was involved in drafting and implementing the Capitol Complex Operations Plan for former Governor Jeb Bush’s 2003 inauguration and in preparing the Operations Plan for the visit by Prime Minister Benjamin Netanyahu and his security detail. In 2009 he was a subject matter expert on the Florida Department of Law Enforcement’s Standards and Training Commission Committee which was tasked with reviewing and revamping the Basic Recruit Training Curriculum for the State of Florida. In 2009, the Florida Department of Financial Services offered him a position as Captain over training and acquisitions. He accepted this position and became responsible for developing and overseeing training for the one-hundred and fifty detectives working throughout the State of Florida who investigate insurance fraud. During his tenure there he oversaw the transition from Sig. Sauer 9 MM to Glock .40 caliber and the training of all officers after the transition. His passion for law enforcement training also led him to the position of Coordinator of the Law Enforcement Academy for the Florida Public Safety Institute from 2006-2009. In 2014, he was an instructor at the High Liability Instructor’s Conference held at Florida Public Safety Institute teaching Handling Veterans, Officer Safety Response, and Managing a Training Unit. He has been an instructorfor the Florida Public Safety Institute, Department of Justice in the Valor program. He has experience teachingin the areas of: human diversity; patrol procedures; first aid; firearms; police pursuit policies; instructor techniques, and handling the mentally ill, police officer safety, De-escalation Skills. Thomas Gleason holds a Bachelor’s Degree in Criminal Justice and a Master’s Degree in Education. He has published two articles dealing with police training and domestic violence.

Cloud Computing Law: Law Enforcement, Competition, & Tax course thumbnail

Coursera

Certificate

Cloud Computing Law: Law Enforcement, Competition, & Tax

Law
Cloud Computing
International Tax Law

Have you ever wondered how a police officer in Europe can obtain evidence from a cloud provider in the USA? Or whether a major cloud provider might abuse its market power? Or in which countries cloud providers pay taxes? If so, then this course is for you! First, we’ll look at how law enforcement agents can request access to cloud data, including data stored outside their borders. You’ll learn to advise cloud providers on responding to access requests and on dealing with potential conflicts with European Union (‘EU’) data protection law. Second, we’ll cover EU competition law, including how to define the relevant market for cloud services and to assess market power. You’ll learn to identify when cloud providers might be found to have entered into anti-competitive agreements, or to have abused a dominant position in a market. Third, we’ll look at how the income from cloud services is taxed. We’ll cover how such income is classified and which countries have the right to tax cloud providers. You’ll learn how tax principles apply to cloud services today, and how this might change in future. In short, we’ll cover how the rules of law enforcement access, competition law, and tax law apply to cloud services – and you’ll discover the practical steps that cloud providers can take to comply with their obligations.

Blockchain, Privacy, and Law Enforcement course thumbnail
FREE

YouTube

Blockchain, Privacy, and Law Enforcement

Blockchain Development
Cybersecurity
Cryptography

Explore the intersection of blockchain technology, privacy concerns, and law enforcement challenges in this informative 57-minute session. Delve into the complexities of maintaining individual privacy while addressing the needs of law enforcement in the context of blockchain systems. Gain insights into the potential conflicts between privacy-preserving technologies and regulatory requirements, and examine potential solutions for balancing these competing interests. Discover how blockchain's transparency and immutability impact both privacy protection and criminal investigations, and consider the implications for future policy and technological developments in this rapidly evolving field.

Privacy Paradigms for Law Enforcement Response course thumbnail
FREE

YouTube

Privacy Paradigms for Law Enforcement Response

Privacy
Cybersecurity
Surveillance

Explore the complex landscape of law enforcement data requests and corporate disclosure obligations in this 20-minute conference talk from PEPR '25. Examine how the phrase "law enforcement response" encompasses various legal processes including wiretap orders, pen register orders, lawful intercept requests, emergency disclosure requests, and national security letters, while understanding why these processes are deliberately opaque and resist comprehension. Learn about the concept of "surveillance intermediaries" coined by Lawfare fellow Alan Rozenshtein and discover how these entities serve as crucial links between law enforcement and data access. Analyze the standardization opportunities available for basic information requests like subpoenas and warrants, and understand the increasing risks posed by aggressive nation-state intelligence operations targeting sensitive corporate infrastructure. Gain insights into practical strategies that privacy professionals can implement to better defend surveillance intermediaries and their critical systems, while navigating the intersection of data privacy, legal compliance, and national security concerns in the modern digital landscape.

The Avalanche Takedown - Landslide for Law Enforcement course thumbnail
FREE

YouTube

The Avalanche Takedown - Landslide for Law Enforcement

Black Hat
Cybersecurity
Cybercrime

Explore a 49-minute Black Hat conference talk detailing the takedown of Avalanche, a sophisticated cybercriminal infrastructure. Delve into the highly secure network of servers that allegedly facilitated malware campaigns and money laundering schemes, resulting in hundreds of millions of dollars in losses and over 500,000 infected systems worldwide. Gain insights into the law enforcement operation that dismantled this extensive criminal enterprise, as presented by Tom Grasso. Discover the challenges faced and strategies employed in this landmark case that significantly impacted the landscape of cybercrime and international law enforcement cooperation.

Playing Games with Cybercriminals - Beyond Law Enforcement Strategies course thumbnail
FREE

YouTube

Playing Games with Cybercriminals - Beyond Law Enforcement Strategies

Cybercrime
Criminology
Sociology

Explore alternative strategies to combat cybercrime beyond traditional law enforcement methods in this 48-minute conference talk from BSidesLV. Examine the limitations of the "hammer" approach of arrests and infrastructure takedowns, and delve into softer, more innovative tactics. Analyze the economics of cybercrime and identify potential levers to disrupt illegal operations and reduce market efficiency. Consider how law enforcement and industry partners can strategically "play games" with cybercriminals to achieve long-term impact in the fight against digital threats. Join Jonathan Lusthaus as he presents fresh perspectives on addressing the persistent and evolving challenges of online criminal activities.

Digital Trails - Challenges and Opportunities for Law Enforcement Agencies course thumbnail
FREE

YouTube

Digital Trails - Challenges and Opportunities for Law Enforcement Agencies

Digital Forensics
Data Analysis
Cybercrime

Explore the complex landscape of digital trails in law enforcement through this insightful 20-minute talk by Dr. Rakshit Tandon. Delve into the challenges faced by law enforcement agencies (LEA) in navigating vast amounts of electronic data, including privacy concerns, legal issues, and the need to keep pace with rapidly evolving technology. Discover the unprecedented opportunities digital trails offer for criminal investigations and gain valuable insights into the future of digital forensics in law enforcement. Learn how LEAs can leverage these digital footprints while addressing the associated complexities in modern criminal investigations.

Be Feminine, Be Firm - Pioneering Women in Law Enforcement course thumbnail
FREE

YouTube

Be Feminine, Be Firm - Pioneering Women in Law Enforcement

Leadership
Management & Leadership
Career Development

Discover the inspiring journey of Manjari Jaruhar, one of India's first female IPS officers, in this powerful TEDx talk. Explore how mental integrity, humility, and passion can break barriers and pave the way for women in traditionally male-dominated fields. Learn valuable lessons on turning challenges into opportunities and thriving in the face of adversity through Jaruhar's firsthand experiences in handling complex Indian crime cases. Gain insights into the transformative impact one dedicated individual can have on society and be inspired to climb the ladder of success with determination and ownership. This talk offers a unique perspective on gender issues in law enforcement and demonstrates the power of perseverance in achieving groundbreaking success.

Law Enforcement in the Han Dynasty - Understanding Imperial China course thumbnail
FREE

YouTube

Law Enforcement in the Han Dynasty - Understanding Imperial China

Chinese History
History
Han dynasty

Explore the complex system of law enforcement during the Han dynasty in this 18-minute video lecture. Delve into the delicate balance of power between the imperial center and local nobility across the vast Han empire. Examine the tension between loyalty to bloodlines and loyalty to the emperor, and learn about significant events like the Rebellion of the Seven States. Discover how the Han dynasty managed to enforce rule of law over its extensive territories for more than 400 years, and gain insights into the factors that led to the end of the Western Han's golden age. This video is the second part of a two-part series on the Han dynasty, offering a comprehensive look at the challenges of governance in imperial China.

Evolving the Noise out of InfoSec Using Law Enforcement Paradigms course thumbnail
FREE

YouTube

Evolving the Noise out of InfoSec Using Law Enforcement Paradigms

Cybersecurity
Information Security
Threat Detection

Explore law enforcement paradigms to evolve information security practices and reduce operational noise in this conference talk from Converge 2016. Learn about effective detection methods, including event classification, triage prioritization, and suspect-centric investigations. Discover how to implement host analysis, connect facts, and develop new hypotheses using Modus Operandi modeling and link analysis. Gain insights into creating evidence boards, utilizing bioinformatics tools like Cytoscape, and identifying patterns to separate signal from noise in security operations.

Private Until Presumed Guilty - Digital Privacy and Law Enforcement Surveillance course thumbnail
FREE

YouTube

Private Until Presumed Guilty - Digital Privacy and Law Enforcement Surveillance

Digital Forensics
Law Enforcement
Reproductive Rights

Explore a thought-provoking DEF CON 31 conference talk that delves into the critical intersection of digital privacy, law enforcement, and reproductive rights in a post-Dobbs landscape. Learn how personal data from health and lifestyle apps can be extracted and used in criminal investigations, with detailed demonstrations of forensic extraction tools and their capabilities. Understand the limitations of Fourth Amendment protections in the digital realm, examining real search warrant examples that highlight the ease with which law enforcement can access private health information. Gain insights into the technical aspects of digital surveillance, including the practical methods used to review sensitive data and the challenges in interpreting this information. Discover the concerning reality of how everyday digital footprints can be leveraged by authorities, with special attention to reproductive health data and broader implications for personal privacy in the modern age.

Connecting the Dots Between Global Terrorism and Local Law Enforcement course thumbnail
FREE

YouTube

Connecting the Dots Between Global Terrorism and Local Law Enforcement

Terrorism
National Security
Political Science

Explore the critical intersection of global terrorism and local law enforcement in this 49-minute panel discussion from The Aspen Institute. Delve into the challenges faced by state and local police in the era of ISIS, where national security, homeland security, and public safety converge. Learn about the technology, information, and resources needed by law enforcement to address this complex battle effectively. Gain insights from experts Jane Harman, Mitch Landrieu, and Roberto Villaseñor, moderated by Michelle Miller, as they discuss topics such as self-radicalization, training, community engagement, and potential solutions. Examine the role of the US Congress, the "No Fly No Buy" policy, and the importance of interfaith dialogue in addressing these challenges. Understand the misalignment between current approaches and the evolving threat landscape, and explore strategies to better equip local law enforcement for their pivotal role in national security.

TETRA Radio Security: Uncovering Secret Cryptography in Law Enforcement Communications course thumbnail
FREE

YouTube

TETRA Radio Security: Uncovering Secret Cryptography in Law Enforcement Communications

Reverse Engineering
Side Channel Attacks
Zero-Day Vulnerabilities

Explore the groundbreaking journey of radio jailbreaking that led to the first public disclosure and security analysis of the proprietary cryptography used in TETRA (Terrestrial Trunked Radio). Delve into the process of uncovering the secret algorithms that have remained hidden for over two decades, bound by restrictive NDAs. Learn about the reverse-engineering techniques and exploitation of zero-day vulnerabilities in the Motorola MTM5x00 TETRA radio and its TI OMAP-L138 trusted execution environment. Discover the challenges faced in side-channel attacks on DSPs, writing decompilers for complex DSP architectures, and exploiting ROM vulnerabilities in the Texas Instruments TEE. Gain insights into the critical importance of this technology, widely used by government agencies, emergency services, and in industrial environments, and understand the implications of its security analysis.

A Causal Framework to Evaluate Racial Bias in Law Enforcement Systems course thumbnail
FREE

YouTube

A Causal Framework to Evaluate Racial Bias in Law Enforcement Systems

Causal Inference
Statistics & Probability
Statistical Analysis

Explore a 16-minute ACM conference talk examining a novel causal framework for analyzing racial bias within law enforcement systems. Join researchers Jessy Xinyi Han, Andrew Miller, S. Craig Watkins, Christopher Winship, Fotini Christia, and Devavrat Shah as they present their theoretical approach to evaluating and understanding systemic racial bias in policing and law enforcement practices.

Tetragon Auditing and Enforcement course thumbnail
FREE

YouTube

Tetragon Auditing and Enforcement

Tetragon
Geometry
Auditing

Explore the intricacies of Tetragon auditing and enforcement in this informative 35-minute conference talk presented by John Fastabend at a Linux Foundation event. Gain valuable insights into the mechanisms and applications of Tetragon's auditing capabilities, as well as its role in enforcing security policies within Linux environments. Delve into the technical aspects of this powerful tool and learn how it can enhance system monitoring and protection in modern computing infrastructures.

AWS SimuLearn: Compliance Enforcement course thumbnail

AWS Skill Builder

Certificate

AWS SimuLearn: Compliance Enforcement

Amazon Web Services (AWS)
Cloud Computing
Governance

AWS SimuLearn is an online learning experience that pairs generative AI-powered simulations with hands-on practice to help individuals learn how to translate business problems into technical solutions through the simulation of dialog between a customer and a technology professional. AWS SimuLearn: Compliance Enforcement In this AWS SimuLearn assignment, you will review a real-world scenario helping a fictional customer design a solution on AWS. After the design is complete, you will build the proposed solution in a guided lab within a live AWS Console environment. You will gain hands-on experience working with AWS services, using the same tools technology professionals use to construct AWS solutions. How does it work? AWS SimuLearn is powered by generative AI that enables you to have life-like conversations with AI customers. Your responses to the AI are evaluated to help develop your soft skills like communication. and problem solving. As you provide the correct responses, a quiz agent with test you and you can also get help from Dr. Newton, the helper agent when you get stuck. Once you provide all of the correct responses for the solution you will move to building it and validating in a live AWS Console environment. AWS SimuLearn: Compliance Enforcement - Services Used Compliance Enforcement AWS Config, AWS Systems Manager

When the Cops Come A-Knocking - Handling Technical Assistance Demands from Law Enforcement course thumbnail
FREE

YouTube

When the Cops Come A-Knocking - Handling Technical Assistance Demands from Law Enforcement

Black Hat
Software Development
Encryption

Explore the complex landscape of technical assistance demands from U.S. law enforcement in this informative Black Hat conference talk. Delve into the types of surveillance assistance the government can compel companies to provide, examining high-profile cases like the FBI's demand for Apple to access the San Bernardino shooter's iPhone. Learn about the potential requirements companies may face, including disclosing user data, decrypting information, writing custom code, or surrendering encryption keys. Gain insights into the importance of advance preparation for handling such demands, especially in light of the U.S. Department of Justice's aggressive stance towards resistant companies. Compare the experiences of tech giants like Apple with smaller entities like Lavabit and Yahoo!, highlighting the challenges and consequences of opposing surveillance orders. Benefit from the expertise of two Crypto Policy Project attorneys from Stanford Law School's Center for Internet and Society as they guide enterprise audiences through the intricacies of technical-assistance orders, applicable laws, and response options. Equip yourself with essential knowledge to effectively manage law enforcement demands, regardless of your company's resources.

Impact of Forensic Linguistics on Law Enforcement, Legal Proceedings, and Policy-Making - Part 6 course thumbnail
FREE

YouTube

Impact of Forensic Linguistics on Law Enforcement, Legal Proceedings, and Policy-Making - Part 6

Linguistics
Case Studies
Policy-Making

Explore the significant impact of forensic linguistics on law enforcement, legal proceedings, and policy-making in this 14-minute lecture from NPTEL-NOC IITM. Discover how linguistic analysis techniques influence criminal investigations, courtroom decisions, and the development of legal policies through examination of real-world case studies that demonstrate the practical applications of this specialized field.

Black and Blue - When Coach Is Also a Cop course thumbnail
FREE

YouTube

Black and Blue - When Coach Is Also a Cop

Community Engagement
Leadership
Conflict Resolution

Explore a compelling discussion on the intersection of law enforcement and community engagement through sports coaching. Delve into the story of Charles Adams, a Minneapolis police officer who built a successful high school football program in a challenging neighborhood. Examine how Adams and other cop-coaches fostered connections with the community while leading their team to a state championship. Analyze the complexities of being both black and in law enforcement, particularly in the aftermath of George Floyd's murder. Listen to insights from Coach Adams and one of his star players as they discuss bridging divides and creating meaningful relationships beyond traditional policing. Consider the potential impacts of these unconventional connections on youth and families in the community.