LEARN HOW TO BECOME A PRIVATE INVESTIGATOR WITH NOVEL DATA'S PRIVATE INVESTIGATOR TRAINING.
INTENSIVE IN-PERSON SESSIONS, ONLINE VIRTUAL CLASSROOMS, SELF-PACED DISTANCE LEARNING AND, VIRTUAL LECTURES
Online & Virtual Classes
How to Become a Private Investigator Courses
Introduction to a Career as a Professional Private Investigator
How to Become a Private Investigator
ICPI - 101
Successful completion of ICPI 101will empower students with meaningful & tangible skills that employers are looking for in new hires without the prerequisite experience. Completion of ICPI 101 will build students' confidence and most importantly reduce or eliminate the risk to companies looking to hire “new” inexperienced Investigators.
The ICPI 101 course will provide you with knowledge, tangible skills, and techniques. Your investment in Novel Data's specialized training for aspiring Private Investigators will reduce or eliminate the hiring risks for prospective employers and their clients. In addition, you will increase your opportunities and chances of early success while building a lasting reputation as a Professional Investigator.
In addition, students will attain tangible and applicable skills needed for success as they start their careers. This will create a solid foundation for valuable development and successful outcome of investigations. Students will gain skills, clarity, insights, and direction. This will benefit them during their first few years. ICPI 101 will help Investigators to understand what will be required or expected of them while they learn and gain experience, developing them into a reputable sought after established Professional Private Investigator.
This course is taught with world-class Private Investigators, many of whom are still working on assignments but have a passion for teaching, mentoring, and telling meaningful stories. Classes are instructed via live remote video (Zoom Video) an accompanied by a distance learning platform.
Classes are also offered in an in-person intensive format over 6 consecutive days. Our instructors and participants will travel to a predetermined location on a predetermined date organized in advance.
Our training courses will fill the experience gap and provide participants with tangible and applicable skills needed for early success. Our training courses will increase your odds of "getting hired" and reduce or eliminate the risk to companies looking to hire “new” inexperienced Investigators.
ICPI - 101 Course Outline
Table of Contents
1. What is a Desk Investigation?
a) How Desk Investigations are performed
b) Desk Investigation file types
2. Desk Investigation Nomenclature
3. Corroborated & Circumstantial Evidence
a) What is Evidence & how to Structure it
b) What is Corroborated Evidence & Examples
c) What is Circumstantial Evidence & Examples
4. The Evidence Document
a) How the document is used abstractly
b) How the Evidence Document is used practically
c) Examples
5. The Investigative Mindset
a) Deductive Reasoning
b) Critical Thinking
c) Esoteric, Instinct or the Sixth Sense
d) Case examples
e) Demographics
f) Pattern Recognition
6. Desk Investigators Mindset
a) Technology as a Tool
b) Mechanics Can Get You
Far, But Not Far Enough
7. Google Basics for North America
a) Google as an Investigative tool
b) Techniques
c) Best practices
8. Social Media & Investigative
Search Basics for North America
a) Different browsers
b) IP challenges and best practices
c) VPN’s
d) Facebook
e) Instagram
f) Twitter
g) LinkedIn
h) Pinterest
i) Craigslist & Kijiji
9. Desk Investigation –
Verify Identify & Expand - V.I.E.able
a) Best practices and protocols
b) Verify
c) Identify
d) Expand
e) Data Management
Pre-Surveillance
1. Daily Gear Protocol
a) Purpose of Daily Gear
Check Protocols
b) Process of Daily Gear
Check Protocols
2. Data & Evidence Security
Measures & Protocols
a) Devices
b) Data management & technology
c) Information management
& exchange
d) Physical Intelligence or
Evidence & challenges
e) Evidence chain of custody
3. File Quick View
4. Information Data Management
a) The Cycle of Data Management
b) The First Steps of Information
Data Management
5. Verify Identify and
Expand - V.I.E.able
6). Sample Pre-Surveillance Report
Pre-Surveillance
1. Surveillance Vehicle
a) Ideal vehicles
b) Performance
c) Tint & sunshades
d) Customization
e) Necessary equipment
f) Need to have &
nice to have accessories
2. Spot Checks
3. Surveillance Set-up
a) Scheduling
b) Pre-Surveillance Research
c) Pre-Surveillance Mapping
d) Spot Check Intelligence
e) General Considerations
f) Best practices
Mobile Vehicle Surveillance
1. Active Mobile Surveillance
– Single Investigator
a) Lead Investigator
b) Communication
c) Communication Protocols
d) Maintaining Surveillance
e) Clients Perspective
f) Patterns
g) Heat
h) Challenges
2. Active Mobile Surveillance
– two or more Investigators
a) Perception & Managing Variables
b) Skill vs, Luck and Circumstances
c) Risk vs. Reward
d) Subject Identification
e) Understanding & managing Heat
f) Equipment – full list needed & required
g) Traffic conditions
h) Active mobile surveillance best practices & tactics
I) Driving Methods for different areas or environments
j) Surveillance concepts
k) Surveillance methods
l) Surveillance best practices
m) What not to-do
n) Situational awareness
o) Common locations
p) Climate conditions
q) Surveillance at night
r) Equipment & positioning
s) Filming protocols
t) Filming best practices
u) Organizational necessities
v) Transitioning to foot surveillance
w) Transitioning back to a surveillance vehicle