Digital Forensics and Cyber Crime Investigations
This course is designed for those just entering or interested in the field of Digital Forensics and Cyber Crime Investigation.
Digital Forensics and Cyber Crime Investigations
Gain the knowledge and skills needed to excel in the dynamic field of digital forensics and cyber crime investigations with this comprehensive course. Designed by an industry expert who has held roles as a law enforcement professional, senior digital forensics consultant and expert witness, this course is perfect for those just entering or interested in the field.
Throughout the course, you'll learn the latest principles and methodologies used to uncover digital evidence and solve complex cases. From understanding the legal aspects of digital forensics to mastering the concepts of data recovery and analysis, you'll acquire practical skills highly valued by employers.
Upon successful completion, you'll receive a certificate from Detego Global, validating your expertise in the fundamentals of digital forensics and cyber crime investigations.
This course comprises 6 sessions, each followed by a quiz to test your understanding of the subject matter.
Session 1
In this section, we cover a comprehensive overview of Digital Forensics and Cyber Crime, including evidence types, the investigation of cyber crimes, and the identification of perpetrators. You'll learn about various cyber crime vulnerabilities and exploits, as well as techniques for detecting cyber crimes and defining different offences.
Session 2
This session provides a thorough recap of Digital Forensics and Cyber Crime, highlighting their differences and the various evidence types associated with each. Participants will explore the ubiquity of Digital Forensics across different crime types, gain an understanding of the various perpetrator types, and examine how the combinatory variance of digital devices affects the structure of investigations.
Session 3
In this session, participants will revisit the various types of evidence found in Digital Forensics and Cyber Crime, and understand how the combinatory variance of digital devices influences investigation structures. The session introduces forensic artefacts and footprints, guiding attendees on what to look for during investigations. Additionally, it covers essential locations for evidence discovery, including logs and data sources, and provides an introduction to network analysis techniques.
Session 4
This session provides a detailed recap of artefacts, footprints, logs, and various sources of forensic acquisition from computers and mobile devices. Participants will delve into the analysis of logical artefacts, learn techniques for tagging and bookmarking, and understand hash and keyword matching. The session also covers critical concepts in encryption and decryption, data carving to recover deleted information, and the use of regular expressions (REGEX). Additionally, attendees will be introduced to various analytic software tools, enhancing their forensic investigation skills.
Session 5
In this session, participants will receive a comprehensive recap of artefact acquisition and analysis, including techniques such as tagging, bookmarking, hash matching, and data carving. The session also covers advanced topics like machine AI recognition for object tagging and methods to reduce the volume of devices and data handled. Attendees will learn about the importance of standard operating procedures (SOPs) and contemporaneous notes in ensuring uniformity and robustness in investigations. Additionally, the session emphasises the development of staff skills, along with the validation and verification of forensic tools and methodologies to maintain high standards in forensic investigations.
Session 6
This session offers a comprehensive overview of digital forensics and cybercrime, highlighting their differences and evidence types. Participants will learn about forensic artefacts, footprints, logs, data sources, and network analysis. Practical skills covered include tagging, bookmarking, hash and keyword matching, encryption/decryption, and data carving. The session also introduces regular expressions (REGEX), analytic software, and object recognition. Key procedures such as first pass decisions, SOPs, contemporaneous notes, validation, verification, disclosure, reporting, and the role of an expert witness will be discussed, providing a thorough understanding of digital forensics investigations.
Trevor Wooding