Cybercrime Courses 1.Child Protection Software 2.Forensic Scan 3.Internet For Investigators 1.Intelligence Gathering On The Internet (Open Source) 1.Covert.

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

Downloading and Document Delivery Accessing and using resources.
National Certificate in Digital Media Computing Walter Patterson Lead Developer Qualification Design Team.
E-OCVM (Version 2) Explained Episode 3 - CAATS II Final Dissemination Event Alistair Jackson EUROCONTROL Episode 3 Brussels, 13 & 14 Oct 2009.
CERT Program Manager: Training and Exercises
Australian Competition & Consumer Commission
Wrap-up and conclussions Guillermo Jorge
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Staff and Departmental Development Unit University of Leeds Using Bodington Common Slides used for face to face session on Bodington Common.
SLIC’s Supplementary and Advanced Training Guidance What does this actually mean in terms of content? Draft guidance.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Serving with pride and confidence Cyber Crime in Thames Valley Police DCS Richard List.
Challenges facing law enforcement agencies in the fight against cybercrime.
EuroCRIS Best Practices & Solutions Members Helping Members Move Forward.
IAEA Cyber Learning Platform For Nuclear Education and Training
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
Forensic and Investigative Accounting
GSC16-OBS-03 ITU-T GSC – 16 Observer Presentation Karen Higginbottom, JTC 1 Chair.
Technology for Computer Forensics by Alicia Castro.
Effort in hours Duration Over Weeks Or Months Inception Launch Web Lifecycle Methodology Maintenance Phases Copyright Wonderlane Studios.
New Employee Training Market Research
Introduction To Information Technology. Defining Information What is Information? Information is any knowledge that comes to our attention. That could.
By Drudeisha Madhub Data Protection Commissioner Date:
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
ACTIVITIES OF INSTITUTE OF FORENSIC RESEARCH TRAININGS FOR PROFESSIONALS.
Taylor Trayner. Definition  Set of business processes developed in an organization to create, store, transfer, and apply knowledge  Knowledge is a firm.
KNOWLEDGE MANAGEMENT TEAM. KM Skills in General 1. Time management → to acquire knowledge 2. Learning technique → to absorb knowledge 3. Networking skill.
Best Practices To ensure that students get the most out of online learning.
Japan National Oil Company Training Centre Anthony Hegarty - aiming higher Global Threats – Global Solutions.
ASIC Australian Securities & Investments Commission Electronic Enforcement Keith Inman October 2000.
How did the internet develop?. What is Internet? The internet is a network of computers linking many different types of computers all over the world.
Wednesday, January 30, 2008 Operations and Information Technology “OIT Training” Joseph M Bognanno Enforcement Advisor Office of Technical Assistance.
Introduction to electronic resources management Workshop introduction and overview.
OVERVIEW OF CYBER TERRORISM IN INDONESIA PRESENTED BY: SUPT. DRS. BOY RAFLI AMAR SPECIAL DETACHMENT 88 AT – INP ARF SEMINAR ON.
Computer Forensics Principles and Practices
Introduction University of Sunderland CIT304 Harry R Erwin, PhD.
S-1 © RGP & UW-CISA 2010 Business & Technology Environment Summer 2010 Robert G Parker.
Preparing for the worst,
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
EDUCAUSE 2005 Annual Conference October 19, 2005.
Mission Statement The mission of NW3C is to provide training, investigative support and research to agencies and entities involved in the prevention,
CJ386-Unit 7 Review A questioned document is any material that contains marks, symbols or signs conveying a meaning or message and whose source or authenticity.
Role of the Financial Intelligence Unit in Implementing an Effective Anti-Money Laundering (AML) Framework Jafar Sadat, Da Afghanistan Bank General Director,
3.4 Internet Strand 3 Sara Liquori. 3.4 Internet  A global computer network providing a variety of information and communication facilities, consisting.
Innovation Software Corporation's Cultural Awareness Training Program Presentation by:
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Crime Scene Investigation Forensic Science. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with.
TEFMA 2008 Sudhish Nayyar. AGENDA CRISIS –What is the worst thing that could happen? –Where? –When? Steps in effective Crisis Management Aon’s capabilities.
Computer Forensics: A 5 Minute Introduction Santa Clara University Department of Computer Engineering April 2007.
Combatting Child Sexual Exploitation – the European Approach Europol Rob Wainwright Director Europol Unclassified - Basic Protection Level Europol Public.
Garda Bureau of Fraud Investigation Computer Crime Investigation Unit Sgt Paul Johnstone LLB MLitt An Garda Síochána Cybercrime and Cyber Risks Credit.
Forensic and Investigative Accounting Chapter 13 Computer Forensics: A Brief Introduction © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago,
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
ITU- BDT Arab Regional Workshop on “Legal Aspects of Child Online Protection” Algiers (Algeria), June 2012 Investigation, Enforcement and Prosecution.
CYBER AND COMPUTER FORENSICS. 2016/06/082 Network of experienced stakeholders in the cybercrime environment Information gathering capability and analytical.
* Fingerprint Development* OUR ORGANIZATION PROVIDES THE SERVICES OF FINGERPRINT (INVISIBLE OR PARTIAL) DEVELOPMENT THROUGH VARIOUS TECHNIQUES I.E. POWDER.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Training those in the workplace 100% Funded by Department of Education & Skills Contact: Allison Bracken Mobile: Skills For Work.
(class #2) CLICK TO CONTINUE done by T Batchelor.
Domestic Violence Jeanette Smith Senior Crown Prosecutor.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
  Brand Intelligence   “We liked the existing investigative services, but we prefer having our own (intelligence) capability.” Introduction Our clients.
SIEM Rotem Mesika System security engineering
Introduction: Understanding Information Technology
KA1 “HIGH SCHOOL HIGH TECH SCHOOL OF THE FUTURE” project lasts from August the 1st, 2014 till July the 31st, 2016.
Associate Degree in Cyber security
Digital Asset Management Part 15: Summary
INVESTIGATION PROCESS AND TECHNIQUE
UNODC and CYBERCRIME October 2009.
Chapter 6 Innovative Systems: From E-Government and E-Learning to C2C E-Commerce and Collaborative Commerce.
Presentation transcript:

Cybercrime Courses 1.Child Protection Software 2.Forensic Scan 3.Internet For Investigators 1.Intelligence Gathering On The Internet (Open Source) 1.Covert Online Investigations 2.Crime Scene Management 3.Managers Course

Pre Course Visit Applications to TAIEX MUST Include a request for the Experts to attend on a 2 day pre course delivery meeting with representatives of the receiving Agency in order to discuss: Legal Framework of the Receiving Country Receive a full briefing on role of the Cybercrime Unit Receive a full briefing on existing domestic cadastres and databases Practical Implementation Software (CPS Only) Selection of Students Training Facilities and Technical Resources Bespoke Tailoring of Course To Suit The Competency of The Agency Concerned Language Issues Affecting Delivery To Students Longer Term Training Strategies

Child Protection Software (CPS) Course 3 Days Train officers in the use of the CPS software Provide the software and licence free of charge Course Content How file sharing works – scoping the problem How to trace by IP address How CPS works Tracing local offenders Practical use of the software

CPS Course Timetable

Forensic Scan 2 Day Course For CPS Investigators, Forensic Examiners, Child Protection Investigators & Offender Management Officers Students must have previously attended the CPS Course Course Content Use of Forensic Scan Tool to Perform Triage of IT Evidence Early Identification and Securing of Evidence (Images) Legal Framework Considerations

Forensic Scan Course Timetable

Internet For Investigators 4 Day Course For Hi Tech Crime & Internet Crime Investigators Course Content Explanation of How a Computer Functions & Operating Systems Description of Network Types How The WWW, Search Engines & Social Networking Sites Operate Tracing s

Internet For Investigators Course Timetable

Intelligence Gathering On The Internet (Open Source) 4 Days For Managers & Investigators (Multi Agency), Analysts and Researchers Course Content Identification of key sources of publicly available information Interrogation of Social Networking Sites Intelligence Development & Risk Assessment Evidentially Sound Techniques Legal Framework One Day Scenario Led Interactive Exercise

Intelligence Gathering On The Internet Timetable

Covert Online Investigation Techniques 5 Days For Investigators – may be a requirement for a 2 day course for Managers Students would benefit from having previously attended the “Internet For Investigators“ Course Course Content Safe, covert use of the Internet Covert interaction with Suspects Communication Technologies Securely Capturing Evidence “Fieldcraft”

Covert Online Investigation Techniques Timetable

Computer Crime Scene & Suspect Premises Searching 2 Days For Managers, Investigators and Prosecutors Course Content Securing a Computer Crime Scene Dealing With Electronic Evidence Legal Issues of Securing Evidence Scenario Based Using Video Aids

Crime Scene Management Course Timetable

Managers Course 2 Days Managers of Computer Crime Units Managers of Child Protection Units Managers of any other unit involved in Computer Crime Investigation Course Content Psychological Protection of Officers Managing Covert Assets Staff Retention

Managers’ Course - Timetable