Cybercrime Computing & Networking Foundation
Provided by QA
Overview
Our digitised society has transformed cybercrime and cyber-enabled fraud into a major revenue stream for organised crime groups (OCG). Action Fraud reports that 80% of reported frauds are cyber-enabled; they could have taken place offline, but their scale, reach and impact have been expanded using online services and digital technology.
Ransomware and the cost of cybercrime is already up a percent of global GDP, over £500 billion a year. The global cybercrime epidemic shows every sign of continuing to rampage through every global economy. This National Cyber Security Center (NCSC) assured course will give you a good understanding of a number of important topics needed as a Cybercrime Specialist, including:
+
Prerequisites
None.
+
Delegates will learn how to
This National Cyber Security Center (NCSC) accredited five-day course will give delegates a good understanding of a number of important topics needed as a Cybercrime Specialist, including:
+
Outline
Module 1 - Computing Concepts & Operating Systems
Module 2 - Networking Protocols & Network Security
Module 3 - Network Architectures & Topologies
Exercise - Create and alter packets with hping3 and eavesdropping with Wireshark
Module 4 - Cloud & Virtualisation
Module 5 - Principles of Digital Evidence
Exercise - Linux Log Analysis
Module 6 - Digital Footprints
Exercise - Linux Firewalls
Exercise - Windows Defender
Exercise - Email headers
Module 7 - Digital Currency Concepts
Exercise - Bitcoin in crime
Exercise - Auditing a bitcoin transaction
Module 8 - Cyber Attacks & Cyber Offences
Exercise - Vulnerability Scanning with Nikto
Exercise - Advanced Network Scanning with SPARTA
Exercise - Denial-of-Service using LOIC
Exercise - Advanced Persistent Threat Analysis
Exercise - Honeypots
Module 9 - Encryption
Exercise - Digital Certificates
Module 10 - Introduction to Neurodiversity
Our digitised society has transformed cybercrime and cyber-enabled fraud into a major revenue stream for organised crime groups (OCG). Action Fraud reports that 80% of reported frauds are cyber-enabled; they could have taken place offline, but their scale, reach and impact have been expanded using online services and digital technology.
Ransomware and the cost of cybercrime is already up a percent of global GDP, over £500 billion a year. The global cybercrime epidemic shows every sign of continuing to rampage through every global economy. This National Cyber Security Center (NCSC) assured course will give you a good understanding of a number of important topics needed as a Cybercrime Specialist, including:
- How a computer works and what its fundamental components are
- How do computers communicate via networks and what protocols are used
- What is binary and why do we use hex and not decimal
- Fundamentals of encryption, cloud and virtualisation
- An introduction to digital forensics and why the integrity of data is paramount no matter what your role
- An understanding of the Computer Misuse Act and Data Protection and why they are important
- Cybercrime threats and cybercrime offences
+
Prerequisites
None.
+
Delegates will learn how to
This National Cyber Security Center (NCSC) accredited five-day course will give delegates a good understanding of a number of important topics needed as a Cybercrime Specialist, including:
- How a computer works and what its fundamental components are
- How do computers communicate via networks and what protocols are used
- What is binary and why do we use hex and not decimal
- Fundamentals of encryption, cloud and virtualisation
- An introduction to digital forensics and why the integrity of data is paramount no matter what your role
- An understanding of the Computer Misuse Act and Data Protection and why they are important
- Cybercrime threats and cybercrime offences
+
Outline
Module 1 - Computing Concepts & Operating Systems
- To explain computer system components
- Describe the differences between magnetic hard drives and solid state drives
- To explain the different characteristics of operating systems
- What file systems are used and what data is contained
- What is a RAID (Redundant Array of Independent Disks)
- What is serverless computing?
Module 2 - Networking Protocols & Network Security
- To explain how networks function?
- How data travels the network?
- Logical address (IP4 and IP6)
- What security protocols can be applied on the network and what they are?
- What are the different types of Firewalls and Gateways and how they work?
Module 3 - Network Architectures & Topologies
- Applications and Application-layer Protocols
- What is Dynamic Host Configuration Protocol (DHCP) and how it functions?
- Attacks against the DHCP and mitigations
- What is information assurance architecture?
- Network traffic analysis
Exercise - Create and alter packets with hping3 and eavesdropping with Wireshark
Module 4 - Cloud & Virtualisation
- What is virtualisation?
- What is a container?
- What is cloud computing and what technologies are used?
- How security is applied within cloud computing
- Breaches impacted by the cloud
- Evidential opportunities in the cloud
Module 5 - Principles of Digital Evidence
- Digital evidence principles and forensic frameworks
- Data vs Information
- Understanding file systems
- IoT device challenges
- Digital forensic images
- Windows & Linux log file analysis
- Write blocking and best practice
- Mobile device images
- Digital evidence
Exercise - Linux Log Analysis
Module 6 - Digital Footprints
- Explain what information and data may be passively or actively transmitted or submitted
- Review data we place in our digital world can easily be harvested
- Email header analysis
- Understand how to take care to protect our data as best as we can
- Discuss social networks, know how to lockdown accounts
- Practice good passphrase management
- Password cracking
Exercise - Linux Firewalls
Exercise - Windows Defender
Exercise - Email headers
Module 7 - Digital Currency Concepts
- How bitcoin and virtual currencies work
- How the block chain works
- What is Proof of work?
- Identifying other cryptocurrencies
Exercise - Bitcoin in crime
Exercise - Auditing a bitcoin transaction
Module 8 - Cyber Attacks & Cyber Offences
- Cyber dependant and enabled crime
- Cyber exploits and vulnerability scanning
- Malware
- Denial of Service
- Combating threats
- Advanced threat analysis
Exercise - Vulnerability Scanning with Nikto
Exercise - Advanced Network Scanning with SPARTA
Exercise - Denial-of-Service using LOIC
Exercise - Advanced Persistent Threat Analysis
Exercise - Honeypots
Module 9 - Encryption
- To explain the uses of encryption technologies
- Describe conventional encryption principles
- To explain cipher classification
- Asymmetric and Symmetric encryption
- PKI and Certificate Authorities
- Digital Signatures
- Hashing scenarios
- Ubiquitous encryption
Exercise - Digital Certificates
Module 10 - Introduction to Neurodiversity
- What is neurodiversity?
- Common neurodivergent thinking styles
- Benefits of neurodivergent thinking styles
- Challenges of neurodivergent thinking styles
- Neurodiversity and Cybercrime
- Online proctored exam taken post-course
- Duration - 70 minutes
- Questions 50, multiple choice (4 multiple choice answers only 1 of which is correct)
- Pass mark 50%
- Digital badge - Certified Cybercrime Specialist
Enquire
Start date | Location / delivery | |
---|---|---|
09 Dec 2024 | QA On-Line Virtual Centre, Virtual | Book now |
01132207150
01132207150