Training Catalog

Welcome to the Zero Abuse Project Training Catalog!

You can use the filters on the to browse the full scope of training Zero Abuse Project is able to offer for your organization. Please note that the On Demand filter can be used to quickly identify our trainings that have been pre-recorded and are available to watch. Most other trainings are available for organizations to book on a fee-for-service basis.

Through our Trauma-informed Prosecutor Project, we are able to offer a select menu of trainings for Prosecutors and other MDT members at no cost. Please select the Trauma-informed Prosecutor Project filter to view these trainings.

If you are an individual seeking training, please visit our Events & Training Calendar to view and register for upcoming trainings hosted by Zero Abuse Project. Unfortunately, Zero Abuse Project cannot book an individual’s request for training.


Filter By Category

Filter By Audience

Filter By Instructor

Filter By Keywords

Filter By Type of Training

Live Stream Platform and Server Communities Search Warrants

This workshop examines emerging social media platforms that are increasingly being used in the course of child exploitation crimes.  Highlighting popular platforms such as Twitch and Discord, this presentation examines best practices in search warrant drafting, including common pitfalls and exigency considerations. Presented by prosecutors and ICAC investigators, this workshop also addresses selection of appropriate legal process, reviewing search warrants

Read More »

Live Stream Platforms/Server Search Warrants

This webinar examines best practices in search warrant drafting, including common pitfalls and exigency considerations. It also addresses selection of appropriate legal process, reviewing search warrants for potential defects, and working with service providers to obtain data.

Read More »

Freed with a CyberTip: Fighting Child Sexual Abuse with Technology

For years, proving child sexual abuse cases relied heavily, if not exclusively, on testimony from a child. Today, however, we can use technology to detect and prove child sexual abuse.  This presentation gives examples of the ways in which criminal activity might come to the attention of law enforcement, including CyberTipline Reports, discovery during another technology-based investigation, and reports by

Read More »

A Voice for the Silent Victim: Corroborating Cases of Non-verbal and Unavailable Victims

When a victim cannot speak for themselves, the investigative team plays a crucial role in constructing a case on their behalf. Establishing a timeline of events stands as a fundamental element within any child maltreatment investigation. Discover the art of collaboration with the Multidisciplinary Team (MDT) to identify pertinent collateral interviews, facilitating corroboration, and utilizing legal processes effectively to bolster

Read More »

Digital Forensics Series: Vehicle Forensics

This webinar addresses the unique forensic evidence from vehicles that can be used in the investigation of technology-facilitated crimes against children. It includes practical methods for recovering the forensic artifacts found in a typical vehicle’s 75 computer systems.

Read More »

The Importance of the Forensic Interview in Technology-Facilitated Crimes

This experiential 2.5 day course teaches ICAC investigators about technology-facilitated crimes and the importance of the forensic interviewer gathering information about a child’s involvement in virtual contexts while ensuring admissibility. Participants will develop case strategies, conduct mock interviews, and present case plans to faculty, exploring the use of digital and other evidence in forensic interviews.

Read More »

Advanced Child Exploitation Search Warrants

This course addresses child exploitation investigations from initial discovery of exploitative material to the search warrant service. Participants will discuss sources of ICAC investigations; identify elements of probable cause development; practice search warrant service preparation and execution; learn about scene management, interviews, evidence collection; and identify key components of post-search warrant debriefing.

Read More »

Surviving the Stand: How to Testify in Child Exploitation Cases

This workshop will equip investigators with practical tools and tactical insight to succeed during courtroom testimony, including avoiding traps in cross-examination. Multimedia components; integration of hypotheticals; and concrete tips for testifying and interacting with judges, juries, and defense attorneys will be included. Specific strategies for case preparation, recovering from mistakes on the stand, and surviving cross-examination will also be addressed.

Read More »

Ethical Issues in Child Victim Cases

Attorneys and multi-disciplinary teams working cases with child victims face a myriad of issues, including those which raise ethical questions. This presentation will involve a review of rules governing the various professions involved in an MDT. We will talk through some factual scenarios to give participants a chance to think through these issues before they arise in the field.

Read More »

Prosecuting Domestic Violence Cases with Absent and Recanting Victims

The very nature of domestic violence – crimes that are often committed in private and involve victims who have love for, loyalty to, and fear of their abusers – makes these cases difficult to successfully prosecute. This is particularly true when the victim has recanted allegations or will not appear in Court to provide truthful testimony. This presentation looks at

Read More »

Everything Offenders Don’t Want You to Know About Sextortion and Other Forms of Image-Based Sexual Abuse

As the world becomes more digitally connected, a single offender can now commit multiple, virtual sexual assaults without ever leaving home.  Sextortion – the use of coercion to compel a victim to engage in some form of sexual conduct – has been steadily increasing over the years, and sometimes involves international actors and financial components. Other forms of image-based sexual

Read More »

Within These Walls: Investigating and Prosecuting the In-School Sexual Assault

What every parent fears: an alert from their children’s school, notifying them of some event like an active shooter. Schools train, drill, and have alerts for active shooters, fires, and other disasters; however, when it comes to addressing in-school sexual assaults – particularly those committed by students – most schools find themselves with no plan. This leads to problems for

Read More »

Online Account Search Warrants: Getting the Most with What You Have

In order to properly investigate online crime, investigators must become well-versed in the preservation, creation and submission of a search warrant, and review of digital evidence contained within the search warrant return.  This course will examine common and uncommon electronic service providers, which are used regularly by law enforcement investigators to legally obtain digital evidence.  Participants will also learn how

Read More »

Investigating and Prosecuting Sexual Assault Cases within an Institution

This workshop identifies dynamics within institutions that may make it easy for abuse to take place and to be ignored or even covered up. Utilizing case examples from universities, faith institutions, and youth serving organizations, attendees will gain a deeper sense of these dynamics. Attendees will also receive concrete recommendations for investigating and prosecuting cases of abuse within an institution. 

Read More »

Jury Selection in a Family Violence Case

Voir Dire in a family violence case can be exceptionally difficult: prospective jurors often bring well-held thoughts about domestic violence to the table, but they may be reluctant to tell the truth about how they really feel. This is especially true in cases where the victim is not participating in the prosecution, in cases with minimal injury, or in cases where the

Read More »

Addressing Recantation in Domestic Violence and Child Abuse Cases

Adults and children recant for a number of reasons.  If prosecutors routinely dismiss cases involving recanting victims, these victims and potential future victims may not be safe.  This presentation will address recantation, how it looks and the process involved. We will discuss ways to mitigate the risk of recantation and the need to investigation recantations. Finally, we will look at

Read More »

Using Technology in Domestic Violence and Stalking Cases

Domestic violence and stalking investigations can become a tedious task for any investigator. To conduct a successful investigation, digital evidence recovery is essential to aid in the corroboration of the victim’s statement. The offender may impose physical injury, but they will also routinely harass, threaten, and inflict psychological trauma upon their victims while committing crimes in person or during online

Read More »

Victim Considerations in Sextortion Cases

As the world becomes more digitally connected, offenders can now commit multiple, virtual sexual assaults without ever leaving their homes.  Sextortion – the use of coercion to compel a victim to engage in some form of sexual conduct – has been steadily increasing over the years, and now may involve international actors and financial components. This presentation will focus attendees

Read More »

The Dynamics of Child Abuse

Each child who has experienced maltreatment goes through their own process of disclosure, and experiences intersecting dynamics and barriers to making a disclosure. There are many misconceptions about how and when children disclose based on adult norms and realities; it’s important that child maltreatment professionals understand the dynamics of child abuse so they can take a holistic approach in educating teams, juries, and

Read More »

Peer Review with an Eye Toward Corroboration – For Prosecutors and MDTs

In conducting peer review of forensic interviewers, it is important not only to critique the question types and adherence to a protocol, but also to critique whether or not the interviewer asked questions that would elicit information that can be corroborated by the multi-disciplinary team. This workshop provides concrete information to expand the peer review process to include this critical

Read More »

Prosecuting Stalking Cases in the Age of Technology

The dynamics of stalking creates unique issues when it comes to prosecution. Stalking cases can result from previously existing relationships or involve a perpetrator who is a stranger to the victim. Understanding the psychology of offending for this particular type of crime is essential to a successful investigation and prosecution. The use of new and emerging methods in technology-facilitated sexual

Read More »

Utilizing Physical and Digital Evidence to Corroborate Difficult Cases

Corroborative evidence can often be the deciding factor on whether or not a case moves forward for charging.  Many cases of abuse and assault often appear to only have the victim and suspect as the “witnesses”.  This presentation will explore ways that police and prosecutors can look beyond those two witnesses and identify ways to present compelling, corroborating evidence.  Using traditional

Read More »

Where the Boys Are: Investigating and Prosecuting Cases of CSA When the Victim is Male

Most sexually abused boys will never make an outcry during childhood and, even if abuse is discovered, investigators and prosecutors will face barriers that impede their ability to protect these children. This workshop explores the research on the sexual abuse of boys and offers concrete suggestions for conducting forensic interviews with these children, investigating crimes against boys, and presenting these

Read More »

Request Training for your Organization

Training Request Form

Before requesting a training, please view our training catalog to see all available training topics.

Unfortunately, Zero Abuse Project cannot book individual requests for training. Please see our Events Calendar to view and register for upcoming trainings that will be hosted by Zero Abuse Project.