top of page

SRO 
in person
training 

logo 2020.jpg
panorama nasro training.jpg

SRO training makes an incredible impact.

Find your training below or contact us to schedule a training today.

"I vividly remember the stress and uncertainty that existed around the “safe schools” issue after Columbine... I always had the gnawing feeling that it was really a “shot in the dark” and we were dependent on pure luck to avoid a terrible tragedy. 

 

When I attended your training last week, for the first time I saw a process and a plan that really had a great probability of stopping most cases of school shooting and violence...  I want to share your process with as many school districts and police departments as possible." 

Charles Pike

Retired Principal

Riverview Community High School

Michigan

Live Instruction:
Identifying and Intercepting School Violence through Cyber-Investigation

When: Training, March 13th and 14th 2023, 8:00AM - 4:00PM CST
Contact Superintendent Mark Greathead: 734-789-2357
or email: greathm@wbsdweb.com
Course Flier

Time Allotted:

March 13th & 14th 2023 8:00AM CST - 4:00PM CST, 2 Day


Target Group:

Patrol Officers, Detectives, Resource Officers, Probation and States Attorney's, School Principals, School Administrators and School Attorneys.


Instructor:

Detective Richard Wistocki (RET ) Naperville Police Department High Tech Crime Unit

Method of Inst:

In Person Woodhaven High School 24787 Van Horn Rd., Brownstown, MI

Instructional Objectives:
Upon completion of the training exercises, participants will:

  • Learn why it is important NOT to disregard information given to LEO or school officials.

  • Understand what the term “Leakage” means and how we can interpret the information.

  • Learn about free and open source online investigative tools.

  • Know items of cyber evidence needed to successfully identify suspects who post online threats.

  • Learn the three-step process in investigating internet crimes.

  • Learn the importance of Preservation, Exigent Circumstances and Search Warrants if needed.

  • Learn how to obtain IP's, screen names, screen captures, and email headers

  • Outline state laws covering; Terrorist Threat, Falsely Making a Terrorist Threat, Swatting and Causing a Catastrophe.

  • Once suspect is identified, importance of search warrant, arrest, interrogation and mental health evaluation.

  • We will examine a successful cyber-crime case study investigation from start to Finish.


IMPORTANT please read carefully: The attending Officer/School Official will need the following items to attend.
1. Computer with internet connection (ensure your computer is turned on early incase it requires updates)
2. Be able to access your WORK email remotely from your computer.
3. Be able to download Snagit on a free trial https://www.techsmith.com/download/snagit/
4. Be able to download the Search.org Investigative toolbar http://www.search.org/resources/
search-investigative-and-forensic-toolbar/

Texas

Live Instruction:
Identifying and Intercepting School Violence through Cyber-Investigation

When: Training, March 27th and 28th 2023, 8:00AM - 4:00PM CST
Contact Scott Donaldson for more information , Email: sdonaldson@collin.eduor Click here.
Course Flier
Texas QR 2023.jpg

Time Allotted:

March 27th & 28th 2023 8:00AM CST - 4:00PM CST, 2 Day


Target Group:

Patrol Officers, Detectives, Resource Officers, Probation and States Attorney's, School Principals, School Administrators and School Attorneys.


Instructor:

Detective Richard Wistocki (RET ) Naperville Police Department High Tech Crime Unit

Method of Inst:

In Person Collin College Law Enforcement Academy 3600 Redbud Boulevard McKinney, TX 75069

Instructional Objectives:
Upon completion of the training exercises, participants will:

  • Learn why it is important NOT to disregard information given to LEO or school officials.

  • Understand what the term “Leakage” means and how we can interpret the information.

  • Learn about free and open source online investigative tools.

  • Know items of cyber evidence needed to successfully identify suspects who post online threats.

  • Learn the three-step process in investigating internet crimes.

  • Learn the importance of Preservation, Exigent Circumstances and Search Warrants if needed.

  • Learn how to obtain IP's, screen names, screen captures, and email headers

  • Outline state laws covering; Terrorist Threat, Falsely Making a Terrorist Threat, Swatting and Causing a Catastrophe.

  • Once suspect is identified, importance of search warrant, arrest, interrogation and mental health evaluation.

  • We will examine a successful cyber-crime case study investigation from start to Finish.


IMPORTANT please read carefully: The attending Officer/School Official will need the following items to attend.
1. Computer with internet connection (ensure your computer is turned on early incase it requires updates)
2. Be able to access your WORK email remotely from your computer.
3. Be able to download Snagit on a free trial https://www.techsmith.com/download/snagit/
4. Be able to download the Search.org Investigative toolbar http://www.search.org/resources/
search-investigative-and-forensic-toolbar/

Illinois

Live Instruction:
Identifying and Intercepting School Violence through Cyber-Investigation

When: Training, May 3rd and 4th 2023, 8:00AM - 4:00PM CST
Contact Katie O'Dell at 217-348-0151
or by email at kodell@roe11.org
Course Flier

Time Allotted:

May 3rd & 4th 2023 8:00AM CST - 4:00PM CST, 2 Day


Target Group:

Patrol Officers, Detectives, Resource Officers, Probation and States Attorney's, School Principals, School Administrators and School Attorneys.


Instructor:

Detective Richard Wistocki (RET ) Naperville Police Department High Tech Crime Unit

Method of Inst:

In Person at The Fields Church,900 Dewitt Ave. East, Matoon IL 61938

Instructional Objectives:
Upon completion of the training exercises, participants will:

  • Learn why it is important NOT to disregard information given to LEO or school officials.

  • Understand what the term “Leakage” means and how we can interpret the information.

  • Learn about free and open source online investigative tools.

  • Know items of cyber evidence needed to successfully identify suspects who post online threats.

  • Learn the three-step process in investigating internet crimes.

  • Learn the importance of Preservation, Exigent Circumstances and Search Warrants if needed.

  • Learn how to obtain IP's, screen names, screen captures, and email headers

  • Outline state laws covering; Terrorist Threat, Falsely Making a Terrorist Threat, Swatting and Causing a Catastrophe.

  • Once suspect is identified, importance of search warrant, arrest, interrogation and mental health evaluation.

  • We will examine a successful cyber-crime case study investigation from start to Finish.


IMPORTANT please read carefully: The attending Officer/School Official will need the following items to attend.
1. Computer with internet connection (ensure your computer is turned on early incase it requires updates)
2. Be able to access your WORK email remotely from your computer.
3. Be able to download Snagit on a free trial https://www.techsmith.com/download/snagit/
4. Be able to download the Search.org Investigative toolbar http://www.search.org/resources/
search-investigative-and-forensic-toolbar/

SRO Training Available

Live Instruction:

Identifying and Intercepting
School Violence through Cyber-Investigation


Course Length:
16 Hours, 2 Days

Contact: Tom Karnes, former National Exchange Club President,
at (313) 999-7429 or tkarnes15@gmail.com today.
Course Flier
Course Evaluations

Target Group:

Patrol Officers, Detectives, Resource Officers, Probation and States Attorney's, School Principals, School Administrators and School Deans.


Instructor:

Detective Richard Wistocki

Method of Inst:

In person 

 

Instructional Objectives:
Upon completion of the training exercises, participants will:

  • Learn why it is important NOT to disregard information given to LEO or school officials.

  • Understand what the term “Leakage” means and how we can interpret the information.

  • Learn about free and open source online investigative tools.

  • Know items of cyber evidence needed to successfully identify suspects who post online threats.

  • Learn the three-step process in investigating internet crimes.

  • Learn the importance of Preservation, Exigent Circumstances and Search Warrants if needed.

  • Learn how to obtain IP's, screen names, screen captures, and email headers

  • Outline state laws covering; Terrorist Threat, Falsely Making a Terrorist Threat, Swatting and Causing a Catastrophe.

  • Once suspect is identified, importance of search warrant, arrest, interrogation and mental health evaluation.

  • We will examine a successful cyber-crime case study investigation from start to Finish.


IMPORTANT please read carefully: The attending Officer/School Official will need the following items to attend.
1. Computer with internet connection (ensure your computer is turned on early incase it requires updates)
2. Be able to access your WORK email remotely from your computer.
3. Be able to download Snagit on a free trial https://www.techsmith.com/download/snagit/
4. Be able to download the Search.erg Investigative toolbar http://www.search.org/resources/
search-investigative-and-forensic-tool bar/

bottom of page