GT-100-LE
Shock & Awe: Cybersecurity Awareness Training for Law Enforcement – Level 1
Description
Buckle up for an intensive cybersecurity awareness training experience designed specifically for the law enforcement community! Experience live demos and workshops revealing how attackers exploit vulnerabilities and showcasing a Hacker’s Toolkit: including evil USBs, phishing scams, ransomware, Wi-Fi poisoning, Evil Twins, and poison phone charger cables. Investigate how hackers exploit social engineering and social media to infiltrate protected systems. With a focus on awareness, we’ll provide actionable insights tailored to the unique demands of law enforcement roles.
Objectives
By the end of this course, participants will:
- Observe an Ethical Hacker Instructors Toolkit (NDA/ethics contract must be signed)
- Understand the critical role of cybersecurity in protecting law enforcement operations.
- Recognize the increasing threat landscape targeting law enforcement agencies.
- Understand the impact of a data breach on investigations and public trust.
- Identify best practices for password management.
- Recognize phishing and social engineering tactics.
- Secure all devices used in field operations
- Understand a basic bug sweep.
Key Takeaways
- Law enforcement professionals are high-value targets (referred to as “whales” in the industry)
- How to combat internal and external cyber threats
- Understanding of techniques used to compromise law enforcement equipment
- Encryption and access controls are essential
- MFA significantly reduces unauthorized access risk
- Keep software and systems updated
Who Is This For
This course is designed for law enforcement professionals including detectives, investigators, and supervisors; support staff in local, state, and federal law enforcement agencies; NATO members; and War Fighters.
Certificate of Completion
- Certificate of Completion issued after successful completion of all chapters, hands-on exercises, and course evaluation.
- Certificate is downloadable from the Ghost Team Academy Education Portal.
Training Outline
Module 1: Introduction
- Topics:
- Welcome and objectives
- Pre-course Exam
- Importance of cybersecurity in modern law enforcement
- Scan the room
Module 2: Cyber Threat Landscape
- Topics:
- Most common cyber threats
- Observe an Ethical Hacker Instructors Toolkit (NDA/ethics contract must be signed)
- Law enforcement-specific threats
- The police car
- Your personal car
- The police station
- Your home and family
- Social media: You’re bleeding information
- Bug sweeps
Module 7: OSINT – Open Source Intelligence
- Topics:
- Sources
- What do lawyers use?
- The Dark Web
Module 3: Encryption, VPNs, and Cloud
- Topics:
- Encryption fundamentals
- Setup a personal VPN
- Are your devices using a cloud?
- Configure your personal phone and laptop
Module 4: Passwords, Authentication, and Access Control
- Topics:
- Strong password creation and management
- Multi-factor authentication (MFA)
- Cracking passwords
- Cloning and hacking access control devices
Module 5: Social Engineering
- Topics:
- Different types
- Most common techniques
- Body language
- How to identify
Module 6: Device and Network Hardening
- Topics:
- Securing mobile devices and laptops
- VPN use and secure Wi-Fi
- Browsers
- Your home camera system and alarm
Module 8: Conclusion
- Topics:
- Course Summary
- Key takeaways
- Action Items
- Q&A
- Post-course Exam



















