Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Cyber Crime Investigation

Course Cover
compare button icon

Course Features

icon

Duration

4 weeks

icon

Delivery Method

Online

icon

Available on

Lifetime Access

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Beginner

icon

Effort

3 hours per week

icon

Teaching Type

Self Paced

Course Description

Learn how to prevent cybercrime

As technology advances rapidly, so does the chance of people exploiting it.

This course is four weeks long and will provide you with the theoretical and technical knowledge necessary to conduct cyber investigations and prevent future cyber crimes.

Learn about the challenges that a cybercrime investigator faces

You'll learn about the laws and best practices for cyber crime prevention, as well as the difficulties that can arise during an investigation.

You'll also learn about data storage, how data is managed, communicated, interpreted, and possibly recovered from a hacked device.

Learn how data can be used to report cybercrime

Exploring volatile and virtual data will help you to understand how this data can be used in your investigation.

This will allow you to recognize the essential elements that make a cyber investigator effective.

Learn from the top cyber investigators

Paul Cain, a leading practitioner who has almost 20 years experience in cyber investigations and digital forensics, will lead the course.

You'll benefit from his experience in both the law enforcement and private sector, to help you with your cyber crime investigation skills.

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

Skills You Will Gain

Prerequisites/Requirements

No hardware, software or other resources required to complete this course

What You Will Learn

Develop a practical understanding of the legislation, best practice, process and challenges associated with the investigation of cyber-crime

Summarise how data is stored, interpreted, managed, communicated and can potentially be recovered from a digital device

Assess the potential evidential value and integrity associated with virtual, volatile and metadata in an investigation

Explain why all of the fundamentals covered in the course would be required to become an effective cyber investigator

Target Students

This course is designed for anyone interested in exploring the fundamentals of digital investigations and cyber crime

Course Instructors

Author Image

Jim Metcalfe

Instructor

Jim is a digital forensic and incident response investigator working primarily in law enforcement casework, interpreting evidence from all types of digital platforms.
Course Cover