CONTACT US

Courses

Level I - Investigative Interviewing Techniques

Level I - Investigative Interviewing Techniques

The Level I - WZ Seminar on Investigative Interviewing Techniques is designed for organizations that desire to use a non-confrontational approach to resolve cases and obtain actionable intelligence. Seminar attendees will learn how to conduct interviews that lead to obtaining information from all parties involved while minimizing liability and maintaining the morale of the organization.

Seminar attendees will learn the importance of rapport in investigative interviews and how to apply these tools in difficult conversations. Instruction includes a comprehensive overview of a variety of non-confrontational interviewing techniques to obtain actionable information from witnesses, suspects, and victims.

This program incorporates proven successful techniques in the field to provide attendees with practical, research-based concepts to tackle any investigation. In addition, the multiple strategies taught offer the seminar participant a wide flexibility of approaches permitting them to alter strategies depending on the level of evidence, subject considerations, and type of interview.

Level II - Practical Application Workshop

Wicklander-Zulawski & Associates has introduced an all-new Practical Applications Workshop for 2023.  This full-day program is designed to provide those who have completed the WZ Level I - Investigative Interviewing Techniques or WZ Level I - Workplace Investigative Interviewing Strategies within the last two (2) years to apply knowledge, skills, and abilities acquired to real-world practical problems.  It is comprised of a single, complex continuing case scenario.  Participants will conduct the exercise investigation from the initial complaint to its full conclusion and disposition.

PROGRAM HIGHLIGHTS:

  • Evaluate a complex real-world misconduct complaint from a fictitious business operation based on an actual case and company.  Use this analysis to create an interview strategy for the parties involved in the allegation and choose the appropriate interview method.
  • Use rapport-based interpersonal communications skills to develop an interview approach that is conversational in nature and non-accusatory.  Then share ideas and notions about the power of various rapport options.
  • Create properly structured, effective empathy statements that preserve intent, project empathy, and avoid personalization.
  • Plan and conduct a challenging interview using the Participatory Interview Method. Demonstrate the ability to use a strategic approach to interviewing, meet resistance effectively and use evidence in a logical, non-confrontational manner.
  • Create powerful introductory statements and assessment questions primarily through the application of the Wicklander-Zulawski Interview Method
  • Draft an investigation summary providing all required information for use by organization decision-makers.

 

Open Source Investigations - OSI.1

Open Source Investigations - OSI.1

Open Source Investigations 1 provides an overview of OSINT and the intelligence cycle.  Attendees will understand the importance of anonymity and the need for focus on methodology over tools.  OSI 1 focuses on online people investigation skills with numerous hands-on exercises to practice what you learn.

Topics include:

  • Privacy & Anonymity
  • Investigation Platform- virtual machines, emulators, sock puppets, mobile phones
  • Search Engines – advanced search operators, reverse image searching
  • Collection & Preservation – recording and collecting OSINT findings
  • Deleted Content – archives and cached
  • Verification and Provenance
  • People Investigation Skills – making use of usernames, cell phones, email addresses and other identifying information
  • Social Media – locating relevant data, confirming accounts, capturing evidence and understanding platform features

Open Source Investigations - OSI.1, 2 & 3 Bundle

Open Source Investigations - 1, 2 & 3 Level Bundle

DOWNLOAD 2023 FLYER HERE

Open Source Investigations 1 provides an overview of OSINT and the intelligence cycle.  Attendees will understand the importance of anonymity and the need for focus on methodology over tools.  OSI 1 focuses on online people investigation skills with numerous hands-on exercises to practice what you learn.

Topics include:

  • Privacy & Anonymity
  • Investigation Platform- virtual machines, emulators, sock puppets, mobile phones
  • Search Engines – advanced search operators, reverse image searching
  • Collection & Preservation – recording and collecting OSINT findings
  • Deleted Content – archives and cached
  • Verification and Provenance
  • People Investigation Skills – making use of usernames, cell phones, email addresses, and other identifying information
  • Social Media – locating relevant data, confirming accounts, capturing evidence, and understanding platform features

Open Source Investigations 2  provides an in-depth exploration of location and event investigations. Attendees will learn techniques for geolocating images, collecting evidence as events happen, and the value of social media for location and event investigations.  OSI 2 provides active learning opportunities with 10 hands-on exercises and case studies. 

Topics include:

  • OSINT Methodology Review
  • Locations & Events – investigating places, events, and incidents
  • Geolocation – using images and context clues to determine location
  • Photos & Metadata – Image analysis and extraction of metadata
  • Live OSINT – locating relevant data as live events happen
  • Maps, Satellite Imagery and Transportation investigations
  • Using Social Media platforms for collecting evidence in real-time or after incidents
  • Social Media heat maps and hashtags
  • OSINT for vulnerability assessments

Open Source Investigations 3 is an advanced course with a focus on business investigations, online due diligence, and dark web investigations.  OSI 3 explores the more technical aspects of open-source investigations.   Attendees participate in numerous hands-on activities and a CTF to practice what they have learned.   

Topics include:

  • Business Investigations and due diligence basics
  • Domains and websites
  • Email Headers & IP Addresses
  • Using wireless networks and MAC ID for investigations
  • International Business Investigations
  • Dark Web, Tor walkthrough and introduction to cryptocurrency
  • Tor investigations and Pastebins
  • Breach data access and ethical considerations
  • Capture the Flag

 

Open Source Investigations - OSI.2

Open Source Investigations - OSI.2

Open Source Investigations 2  provides an in depth exploration of location and event investigations. Attendees will learn techniques for geolocating images, collecting evidence as events happen and the value of social media for location and event investigations.  OSI 2 is provides active learning opportunities with 10 hands on exercises and case studies. 

Topics include:

  • OSINT Methodology Review
  • Locations & Events – investigating places, events and incidents
  • Geolocation – using images and context clues to determine location
  • Photos & Metadata – Image analysis and extraction of metadata
  • Live OSINT – locating relevant data as live events happen
  • Maps, Satellite Imagery and Transportation investigations
  • Using Social Media platforms for collecting evidence in real time or after incidents
  • Social Media heat maps and hashtags
  • OSINT for vulnerability assessments

Open Source Investigations - OSI.2 & 3 Bundle

Open Source Investigations - OSI.2 & OSI.3 Bundle

Open Source Investigations 2  provides an in depth exploration of location and event investigations. Attendees will learn techniques for geolocating images, collecting evidence as events happen and the value of social media for location and event investigations.  OSI 2 is provides active learning opportunities with 10 hands on exercises and case studies. 

Topics include:

  • OSINT Methodology Review
  • Locations & Events – investigating places, events and incidents
  • Geolocation – using images and context clues to determine location
  • Photos & Metadata – Image analysis and extraction of metadata
  • Live OSINT – locating relevant data as live events happen
  • Maps, Satellite Imagery and Transportation investigations
  • Using Social Media platforms for collecting evidence in real time or after incidents
  • Social Media heat maps and hashtags
  • OSINT for vulnerability assessments

Open Source Investigations 3 is an advanced course with a focus on business investigations, online due diligence and dark web investigations.  OSI 3 explores the more technical aspects of open-source investigations.   Attendees participate in numerous hands-on activities and a CTF practice what they have learned.   

Topics include:

  • Business Investigations and due diligence basics
  • Domains and websites
  • Email Headers & IP Addresses
  • Using wireless networks and MAC ID for investigations
  • International Business Investigations
  • Dark Web, Tor walkthrough and introduction to cryptocurrency
  • Tor investigations and Pastebins
  • Breach data access and ethical considerations
  • Capture the Flag

Open Source Investigations - OSI.3

Open Source Investigations - OSI.3

Open Source Investigations 3 is an advanced course with a focus on business investigations, online due diligence and dark web investigations.  OSI 3 explores the more technical aspects of open-source investigations.   Attendees participate in numerous hands-on activities and a CTF practice what they have learned.   

Topics include:

  • Business Investigations and due diligence basics
  • Domains and websites
  • Email Headers & IP Addresses
  • Using wireless networks and MAC ID for investigations
  • International Business Investigations
  • Dark Web, Tor walkthrough and introduction to cryptocurrency
  • Tor investigations and Pastebins
  • Breach data access and ethical considerations
  • Capture the Flag

Trauma Informed Interviewing (PR)

Attend the Wicklander-Zualwski (WZ) Trauma Informed Interviewing course and discover methods on how to conduct more effective interviews, resulting in identifying the truth more efficiently and with less resistance while minimizing the re-traumatization of the interviewee. Learn about the impact of trauma on memory, the risks of misclassification of behavior, and practical tools allowing them to facilitate a productive conversation.

Disclaimer: In an effort to demonstrate the importance of trauma-informed interviewing and the impact of traumatic experiences, there will be discussions and examples of real-life situations. Class materials, including video examples of traumatized people sharing their experiences, may be sensitive in nature and could be triggering for some individuals.

CONTACT US