Document

Cybercrime Courses
1. Child Protection Software
2. Forensic Scan
3. Internet For Investigators
1. Intelligence Gathering On The Internet (Open Source)
1. Covert Online Investigations
2. Crime Scene Management
3. Managers Course
Pre Course Visit
Applications to TAIEX MUST Include a request for the Experts to attend
on a 2 day pre course delivery meeting with representatives of the
receiving Agency in order to discuss:
•
Legal Framework of the Receiving Country
•
Receive a full briefing on role of the Cybercrime Unit
•
Receive a full briefing on existing domestic cadastres and databases
•
Practical Implementation Software (CPS Only)
•
Selection of Students
•
Training Facilities and Technical Resources
•
Bespoke Tailoring of Course To Suit The Competency of The Agency Concerned
•
Language Issues Affecting Delivery To Students
•
Longer Term Training Strategies
Child Protection Software (CPS) Course
3 Days
Train officers in the use of the CPS software
Provide the software and licence free of charge
Course Content
•
•
•
•
•
How file sharing works – scoping the problem
How to trace by IP address
How CPS works
Tracing local offenders
Practical use of the software
CPS Course Timetable
Day 1
0900 - 1030 1100 - 1230 1230 - 1330 1330 -1500
Course
Gnutella
Opening,
Software
Lunch
Using Phex
Introduction Installation
Day 2
CPS
Prioritising
Dashboard Offenders
Lunch
Practical Researching
Offender
History
Day 3
Suspect
Advanced
Monitor
Features
and
and Gridcop
Sharaza LE
Lunch
Review
Forensic Scan
2 Day Course
• For CPS Investigators, Forensic Examiners, Child Protection
Investigators & Offender Management Officers
Students must have previously attended the CPS Course
Course Content
• Use of Forensic Scan Tool to Perform Triage of IT Evidence
• Early Identification and Securing of Evidence (Images)
• Legal Framework Considerations
Forensic Scan Course
Timetable
Day 1
Day 2
0900 - 1030 1100 - 1230 1230 - 1330 1330 -1500
Practical –
Course
Practicalities
Prove
Opening,
Lunch
WriteHashing
Introduction
blocking
Works
Practical Application
Running the and Legal
software Framework
Lunch
Further
practice and
review
Internet For Investigators
4 Day Course
• For Hi Tech Crime & Internet Crime Investigators
Course Content
• Explanation of How a Computer Functions & Operating Systems
• Description of Network Types
• How The WWW, Search Engines & Social Networking
Sites Operate
• Tracing Emails
Internet For Investigators
Course Timetable
Day 1
Day 2
Day 3
Day 4
0900 - 1030
1100 - 1230
1230 - 1330
1330 -1500
Course Opening
and Introductions
Internet and
Network
Technology 1
Lunch
Internet and
Network
Technology 2
Lunch
E-Mail
How it works and
How to trace it
WWW
How it works – Tracing and
Traceability
Email Practical
Exercise
Chat / Instant
Messenger and
VOIP
Lunch
IRC and Web Chat
Peer to Peer File
sharing
Other
Technologies
Lunch
Proactive
Financial
Investigations and
Arrest Strategies
Intelligence Gathering On The Internet
(Open Source)
4 Days
For Managers & Investigators (Multi Agency), Analysts and Researchers
Course Content
Identification of key sources of publicly available information
Interrogation of Social Networking Sites
Intelligence Development & Risk Assessment
Evidentially Sound Techniques
Legal Framework
One Day Scenario Led Interactive Exercise
Intelligence Gathering On The Internet
Timetable
Day 1
Day 2
Day 3
Day 4
0900 - 1030
Course Opening
and
Introduction
1100 - 1230
How the
Internet
Works
Practical
Exercise –
Search Engines
Practical
Exercise Advanced
searching
Groups and
Communities
Evidence /
Intelligence
Capture
Scenario based practical
exercise
1230 - 1330
Lunch
1330 -1500
Tracing and
Traceability
(Footprints)
Lunch
Practical
Exercises People
Searching
Lunch
Practical
Exercise Evidence /
Intelligence
Capture
Lunch
Scenario
based
Covert Online Investigation Techniques
5 Days
For Investigators – may be a requirement for a 2 day course for Managers
Students would benefit from having previously attended the “Internet For
Investigators“ Course
Course Content
Safe, covert use of the Internet
Covert interaction with Suspects
Communication Technologies
Securely Capturing Evidence
“Fieldcraft”
Covert Online Investigation Techniques
Timetable
0900 - 1030
1100 - 1230
1230 - 1330
Day 1
Course Opening
and Introduction
Empty Room
Scenario
Lunch
Day 2
Web Browsing
Evidence Capture
and Corroboration
Lunch
Email
Email Practical
Chat and
Messenger
Practical
Lunch
Chat and
Messenger
Practical
Lunch
Practical
Sessions
Day 3
Day 4
Day 5
Practical Sessions
Legal Implications
and Authorities
Course Evaluation
and Closure
Lunch
1330 -1500
Cover Story
Building
Computer Crime Scene & Suspect Premises
Searching
2 Days
For Managers, Investigators and Prosecutors
Course Content
Securing a Computer Crime Scene
Dealing With Electronic Evidence
Legal Issues of Securing Evidence
Scenario Based Using Video Aids
Crime Scene Management
Course Timetable
Day 1
Day 2
0900 - 1030 1100 - 1230 1230 - 1330 1330 -1500
Course
Practical
Legislation
Opening
Exercise
and
Lunch
and
Scene
Principals
Introduction
Search
Practical
Session
Scene
Search
Search Debrief
Lunch
Course
Review
Managers Course
2 Days
• Managers of Computer Crime Units
• Managers of Child Protection Units
• Managers of any other unit involved in Computer Crime
Investigation
Course Content
• Psychological Protection of Officers
• Managing Covert Assets
• Staff Retention
Managers’ Course - Timetable
Monday
Tuesday
0900 - 1030 1100 - 1230 1230 - 1330 1330 -1500
Course
Network
Computer
Lunch
Opening and
Investigation
Forensics
Introductions
Managing
Health and
Staff
Safety
Covert
Physical and
Assets and
Psychological
Staff
Well Being
Retention
Lunch
Course
Review