Criminals are leaps and bounds beyond Law Enforcement investigators in their use of technology in the commission of crimes. Most criminals believe they can survive behind the anonymity provided by the Internet. What the suspects (and investigators) do not realize is that every click is tracked, and the right investigator can track most of those clicks right back to their suspect. The key to these investigations is knowing not only where to look, but how to look at the data. Through a series of instructor-led presentations, group projects, and critical thinking exercises, participants will learn how to find sources of data, retrieve the data, and use tools to analyze the information obtained. Those attending this course may bring a laptop and mouse with an updated Internet browser (preferably Google Chrome) and Microsoft Excel (or CJI will provide a laptop to use).