This course is for investigators active in the cyber arena, but who may not be experienced in all aspects of cyber criminality and the various commodities and platforms cyber investigations can lead.
For the Phoenix program, this module is the foundation entry point for all other modules taught. It gives an insight for delegates to understand how the various techniques and tactics taught can counter and exploit the cyber criminals techniques and
This course will take investigators who may be new to the field of cyber investigations or experienced in only one area of cyber investigations to a level of understanding that will equip them to become proficient operators in both cyber enabled and cyber dependent crime investigations and deployments.
Delegates will understand the component elements of how criminals and terrorists use the internet to achieve their criminal aims and how as investigators they can impact on this activity.
• Cyber dependent versus cyber enabled activity
• Child sexual exploitation and abuse where the internet is utilised
• Cyber terrorism
• Cyber attacks and hacking processes
• Stages of cyber crime
• Investigating cyber criminality
• Designing a cyber crime attack
Not a stand-alone course
Dates and Venues:
Please contact us for details