Two (2) days -
10 contact hours:
8:00 a.m. - 4:00 p.m. (Day 1)
8:00 a.m. - 1:00 p.m. (Day 2)
14 & 15, 2017
WARCOG Regional Dispatch Center
THIS COURSE IS FOR CRIMINAL JUSTICE ADMINISTRATORS, TERMINAL AGENCY COORDINATORS (TAC), LOCAL AGENCY SECURITY OFFICERS (LASO), AND INFORMATION TECHNOLOGY (IT) PERSONNEL WHO SUPPORT LAW ENFORCEMENT AGENCIES.
CJ-100 is a one and a half day course designed for law enforcement executives who require a basic, but summative understanding of Criminal Justice Information System (CJIS) compliance standards for their law enforcement agencies. Since law enforcement chief executives are identified as the administrators of their respective criminal data and records management systems, they need to be armed with the appropriate knowledge and tools to ensure computer hardware, software, and
network appliances are implemented pursuant to current CJIS 5.6 standards. All too often, police chiefs, sheriffs and directors (and their support personnel: TACs, LASOs, and IT staff) are tasked with this great responsibility but lack the knowledge, skills and abilities to carry out this daunting responsibility.
Students of CJ-100 will thoroughly review the CJIS 5.6 manual and learn how to utilize the CJIS security manual as a basis for developing an appropriate IT security program and compliance policies for state law enforcement criminal justice data systems. Executives will learn about evolving cyber threats that target law enforcement and local government agencies and how proper implementation of CJIS policies can mitigate such threat risks.
Attendees will learn about real-life application of CJIS policies and leave this course with tangible examples of successful solutions they can immediately implement in their agencies. CJ-100 provides law enforcement executives, TACs, LASO, and IT support personnel with a very high-level overview of CJIS policy implementation which is taught in plain-English for the executive who lacks a comprehensive IT background.
Students will also be armed with information and appropriate processes for vetting vendors who sell hardware and services to law enforcement agencies which are utilized in computer networks of would have access to such networks or criminal justice information.
Topics Covered Include:
● What is the CJIS security policy?
● State Law Enforcement Criminal Justice Data System compliance
● Section-by-section breakdown and explanation of the CJIS policy manual
● Case Study: Learn how a local agency implements CJIS policy from the top to the bottom of the
Department which desire to host this course may contact LEOTTA for further details.ype your paragraph here.
Agencies wishing to host this course may contact LEOTTA, LLC. at email@example.com or call us at: 216-503-1113.