Cyber Crime - Foundation

Kesto

Kesto:

Vain 5 päivän

Menetelmä

Menetelmä:

luokkahuone / Online / Hybridi

Seuraava päivä

Seuraava päivä:

20/3/2023 (Maanantai)

Overview

Get an accelerated introduction to the four cyber security pillars of law enforcement: Prepare Prevent, Pursue and Protect. On this fast 5-day Cyber Crime Foundation course, you’ll study practical cyber security concepts and how they can support quick investigations, fast time-to-interview and case disposal.

NCSC w/APMG

You’ll learn to perform computer and network exercises using the latest technologies and equipment. You’ll also build a foundation of IT security knowledge and threats, including:

  • Computing and networking protocols and devices
  • Wireless networking
  • Computer forensic examination
  • Attack vectors
  • Encryption and hashing

Whatever your experience or background within law enforcement, this course will provide you with the foundation of cyber security skills you need.

Our courseware has been approved by APMG, using the NCSC Certified Training scheme criteria for content of courses. Because full NCSC certification of training also specifies approval of both the training delivery and the quality management process, our courseware, whilst approved to a high standard, is not certified under the NCSC scheme

8 syytä, miksi kannattaa hankkia Cyber Crime Foundation Firebrand Trainingiltä:

  1. Koulutuksen ja todistuksen saaminen kestää vain 5 päivän. Meidän kanssamme saat Cyber Crime Foundation -koulutuksen ja -todistuksen ennätysajassa. Todistuksen ansaitset koulutuskeskuksessamme osana intensiivistä ja nopeutettua koulutusta.
  2. Hintaan sisältyy kaikki.Kertamaksu kattaa kaikki kurssimateriaalit, kokeet, kuljetuksen, majoituksen ja ateriat ja tarjoaa kustannustehokkaimman tavan hankkia Cyber Crime Foundation koulutus ja todistus. Ilman mitään lisäkustannuksia.
  3. Suorita tutkinto ensimmäisellä kerralla tai kertaa koulutus ilmaiseksi. Tämä on takuumme. Olemme varmoja, että läpäiset Cyber Crime Foundation -kurssin ensimmäisellä kerralla. Mutta jos näin ei käy, voit tulla takaisin vuoden kuluttua ja maksaa vain majoituksesta ja kokeista. Kaikki muu on ilmaista.
  4. Opit enemmän.Päivä perinteisen koulutuksen tarjoajan kanssa on yleensä klo 9–17, mihin sisältyy pitkä lounastauko. Firebrand Trainingiltä saat vähintään 12 tuntia päivässä keskittynyttä ja häiriötöntä laatukoulutusaikaa opettajasi kanssa.
  5. Opit Cyber Crime Foundation nopeammin. Yhdistämme 3 eri oppimistyyliä (visuaalisen|kuuloon perustuvan|kosketukseen perustuvan) tarjotaksemme materiaalin tavalla joka varmistaa, että opit nopeammin ja helpommin.
  6. Opiskelet huippujen kanssa.Olemme kouluttaneet ja sertifioineet 134.561 ammattilaista ja olemme kumppaneita kaikkien alan suurien nimien kanssa ja olemme saaneet lukuisia palkintoja, mm. Microsoftin Danmarki Vuoden koulutuspartneri 2010, 2011, 2012 ja 2013, Institue of IT Trainingin ”Training Company of the Year 2006, 2007, 2008” Englannissa, ISC(2):n ”Highest Performing Affiliate of the Year 2009 & 2010 – EMEA” sekä EC-Councilin ”Accredited Training Centre of the Year 2010 og 2011”, ”Newcomer of the Year 2011” ja ”Instructors Circle of Excellence”.
  7. Opit enemmän kuin pelkän teorian. Olemme kehittäneet Cyber Crime Foundation kurssia edelleen käyttämällä laboratorioita, esimerkkitapauksia ja harjoittelukokeita varmistaaksemme, että osaat soveltaa uutta tietoa työympäristöön.
  8. Opit parhailta. Ohjaajamme Cyber Crime Foundation kurssilla ovat alan parhaita. He tarjoavat ainutlaatuisen yhdistelmän asiantuntemusta, kokemusta ja intohimoa opetukseen.

Benefits

Curriculum

Core Concepts

  1. Cyber-attacks and cyber-offences
    • The nature of different cyber-attacks and their correlation to cyber-offences
  2. Network protocols and network security
    • The TCP/IP protocol suite with all its supporting protocols and their contribution to security technologies and controls
  3. Digital currency concepts
    • Virtual currency as a concept and as a culture expanding into the relevant technologies
  4. Operating systems
    • The modern operating systems used in computing devices including computers, game consoles, mobile phones and embedded devices
  5.  Open source intelligence
    • Using native operating systems commands for performing basic open source intelligence searches
  6. Cloud and virtualisation
    • What different types of cloud services are available, how virtualisation works and how it can impact an investigation
  7. Live digital forensics
    • Gain an understanding of live digital forensic techniques and the impact they have on the integrity of an investigation
  8. Principles of digital forensics
    • Work with a DFI (Digital Forensics Investigator) and understanding what they can do. Gain a basic understanding of ISO 17025
  9. Principles of digital evidence
    • The ACPO Principles of Digital Evidence
  10.  Network architectures & topologies
    • Gain a basic understanding of simple network topologies and architectures, and how different devices can interact with and become part of a network
  11.  Crime scene management
    • Managing the Digital/Logical Crime Scene
  12.  Relevant legislation
    • The various areas of legislation that are fundamental to core areas of cyber criminality, such as Computer Misuse Act, Human Rights Act, Data Protection Act and Regulation of Investigatory Powers Act
  13.  Understanding of neurodiversity
    • Gain an understanding of neurodiversity and the autistic spectrum

Example Terms, Techniques and Technologies

  1.  Cyber-attack and cyber-offence topology
    • Detailed correlation between attacks and offences expanding into cyber-crime, hacktivism, cyber espionage and cyber warfare
  2.  TCP, IP, UDP, ARP/RARP, ICMP, IGMP, SMTP, SNMP, POP3, IMAP4, HTTP, FTP, SSH, Telnet
    • Protocol purpose, headers and application
  3. Technical cyber-attacks
    • Man-in-the-middle, denial of service (including DDoS), defacement, SQLite, malware, backdoors (including misconfigurations), targeted attacks
  4.  Linux/Android operating system
    • Basic setup of Linux/Android operating systems using virtualisation
  5.  Mac/iOS operating system
    • Basic setup of Mac/iOS operating systems using virtualisation
  6.  Windows operating systems
    • Basic setup of Windows operating systems using virtualisation
  7.  Wireless networking
    • Wireless networking protocols
  8.  Encryption
    • How encryption works and its impact on an investigation. Including the difference between encryption types and hashing
  9.  Continuity of evidence & chain of custody
    • How to maintain and ensure chain of custody for digital devices and evidence
  10.  ACPO Principles of Digital Evidence
    • Understanding the four principles: Prepare, Prevent, Protect and Pursue
  11.  Exhibit identification & exhibit seizure
    • Being able to recognise and identify potential sources of digital evidence, and being able to seize different types of storage media
  12.  Games consoles & embedded devices
    • Types, opportunities and timescales for examinations and likely standard outputs
  13.  Home and business network setups
    • Typical setups and configurations. Things to consider for both in terms of opportunities and management of scenes
  14.  Initial live device handling
    • Initial handling of different devices whether live (switched on) or ‘dead box’ (switched off) as well as other devices such as routers
  15.  Legislation and powers
    • CMA, HRA, DPA, RIPA etc.
  16.  Live digital device risks
    • Identification and management of potential risks
  17.  Risk assessments
    • How to complete and review risk assessments
  18.  Scene mapping & scene searching
    • Physical mapping of a scene involving digital evidence sources, including identifying potential lines of enquiry
  19.  Seizures relating to digital media
    • The actual process of safely seizing different forms of digital media
  20.  Servers
    • Types, opportunities and timescales for examinations and likely standard outputs
  21.  The Internet of Things (IoT)
    • Overview of the concept behind IoT

Exam Track

At the end of your accelerated course, you'll sit the following exam at the Firebrand Training centre, covered by your Certification Guarantee:

Cyber Crime Foundation exam

  • Format: Online and multiple choice

What's Included

Prerequisites

Before attending this accelerated cyber crime course, you should have knowledge in:

  • Computers
  • Statute and case law in relation to cyber crime
  • The ACPO Good Practice Guide for Digital Evidence

Arvioinnit

Olemme kouluttaneet kymmenen vuoden aikana yli 134.561 opiskelijaa. Heitä kaikkia on pyydetty arvioimaan pikakurssimme. Tällä hetkellä 96,55% on sitä mieltä, että Firebrand on ylittänyt heidän odotuksensa:

"The course wasn't technically aimed at me, but gave me an insight into the world of cyber crime, in which my employment sits."
Les Delahunty, HMRC. (10/10/2022 (Maanantai) - 14/10/2022 (Perjantai))

"Well ran informative course, set at a good pace."
GM. (10/10/2022 (Maanantai) - 14/10/2022 (Perjantai))

"I would recommend. Found the trainer and facilities excellent, can't fault it."
Philip Jacques. (10/10/2022 (Maanantai) - 14/10/2022 (Perjantai))

"Very informative course delivered at a good pace allowing you to learn whilst not being overloaded with information."
Anonymous, City of London Police. (10/10/2022 (Maanantai) - 14/10/2022 (Perjantai))

"Technical instructions delivered in a simple to understand format."
Anonymous, Metropolitan Police. (12/7/2021 (Maanantai) - 16/7/2021 (Perjantai))

Kurssipäivämäärät

Cyber Crime - Foundation

Alkaa

Loppuu

Saatavuus

Rekisteröidy

10/10/2022 (Maanantai)

14/10/2022 (Perjantai)

Päättynyt - Jätä palautetta

 

20/3/2023 (Maanantai)

24/3/2023 (Perjantai)

Paikkoja saatavilla

Rekisteröidy

Uusimmat arvostelut opiskelijoiltamme