Cyber Crime Foundadtion

What’s Included

Your accelerated course includes:

  • Accommodation *
  • Meals, unlimited snacks, beverages, tea and coffee *
  • On-site exams **
  • Exam vouchers **
  • Practice tests **
  • Certification Guarantee ***
  • Courseware
  • Up-to 12 hours of instructor-led training each day
  • 24-hour lab access
  • Digital courseware **




Enquire Now

Category:

Description

Overview

Get an accelerated introduction to the four cyber security pillars of law enforcement: Prepare Prevent, Pursue and Protect. On this fast 5-day Cyber Crime Foundation course, you’ll study practical cyber security concepts and how they can support quick investigations, fast time-to-interview and case disposal.

You’ll learn to perform computer and network exercises using the latest technologies and equipment. You’ll also build a foundation of IT security knowledge and threats, including:

  • Computing and networking protocols and devices
  • Wireless networking
  • Computer forensic examination
  • Attack vectors
  • Encryption and hashing

Whatever your experience or background within law enforcement, this course will provide you with the foundation of cyber security skills you need.

Our courseware has been approved by APMG, using the NCSC Certified Training scheme criteria for content of courses. Because full NCSC certification of training also specifies approval of both the training delivery and the quality management process, our courseware, whilst approved to a high standard, is not certified under the NCSC scheme

Six reasons why you should sit your course with Firebrand Training

  1. You’ll be trained in just 5 days. You’ll learn fast when you’re taught by law enforcement professionals
  2. Our course is all-inclusive. A one-off fee covers all course materials, exams, accommodation and meals. No hidden extras
  3. You’ll learn more. Get immersed in the world of cyber crime as you learn from instructors with experience in cyber crime operations and policing
  4. You’ll learn faster. Chances are, you’ll have a different learning style to those around you. We combine visual, auditory and tactile styles to deliver the material in a way that ensures you will learn faster and more easily
  5. You’ll be studying with the best. We’ve trained over 2,300 police officers across 30+ forces in the UK and gained national coverage in the BBC
  6. You’ll do more than study Firebrand’s courseware. Get access to the Turing Cyber Suite and study the latest developments in cyber crime

Benefits

Seven reasons why you should sit your course with Firebrand Training

  1. Two options of training. Choose between residential classroom-based, or online courses
  2. You’ll be certified fast. With us, you’ll be trained in record time
  3. Our course is all-inclusive. A one-off fee covers all course materials, exams**, accommodation* and meals*. No hidden extras.
  4. Pass first time or train again for free. This is our guarantee. We’re confident you’ll pass your course first time. But if not, come back within a year and only pay for accommodation, exams and incidental costs
  5. You’ll learn more. A day with a traditional training provider generally runs from 9am – 5pm, with a nice long break for lunch. With Firebrand Training you’ll get at least 12 hours/day quality learning time, with your instructor
  6. You’ll learn faster. Chances are, you’ll have a different learning style to those around you. We combine visual, auditory and tactile styles to deliver the material in a way that ensures you will learn faster and more easily
  7. You’ll be studying with the best. We’ve been named in Training Industry’s “Top 20 IT Training Companies of the Year” every year since 2010. As well as winning many more awards, we’ve trained and certified over 100,000 professionals

Curriculam

Core Concepts

  1. Cyber-attacks and cyber-offences
    • The nature of different cyber-attacks and their correlation to cyber-offences
  2. Network protocols and network security
    • The TCP/IP protocol suite with all its supporting protocols and their contribution to security technologies and controls
  3. Digital currency concepts
    • Virtual currency as a concept and as a culture expanding into the relevant technologies
  4. Operating systems
    • The modern operating systems used in computing devices including computers, game consoles, mobile phones and embedded devices
  5.  Open source intelligence
    • Using native operating systems commands for performing basic open source intelligence searches
  6. Cloud and virtualisation
    • What different types of cloud services are available, how virtualisation works and how it can impact an investigation
  7. Live digital forensics
    • Gain an understanding of live digital forensic techniques and the impact they have on the integrity of an investigation
  8. Principles of digital forensics
    • Work with a DFI (Digital Forensics Investigator) and understanding what they can do. Gain a basic understanding of ISO 17025
  9. Principles of digital evidence
    • The ACPO Principles of Digital Evidence
  10.  Network architectures & topologies
    • Gain a basic understanding of simple network topologies and architectures, and how different devices can interact with and become part of a network
  11.  Crime scene management
    • Managing the Digital/Logical Crime Scene
  12.  Relevant legislation
    • The various areas of legislation that are fundamental to core areas of cyber criminality, such as Computer Misuse Act, Human Rights Act, Data Protection Act and Regulation of Investigatory Powers Act
  13.  Understanding of neurodiversity
    • Gain an understanding of neurodiversity and the autistic spectrum

Example Terms, Techniques and Technologies

  1.  Cyber-attack and cyber-offence topology
    • Detailed correlation between attacks and offences expanding into cyber-crime, hacktivism, cyber espionage and cyber warfare
  2.  TCP, IP, UDP, ARP/RARP, ICMP, IGMP, SMTP, SNMP, POP3, IMAP4, HTTP, FTP, SSH, Telnet
    • Protocol purpose, headers and application
  3. Technical cyber-attacks
    • Man-in-the-middle, denial of service (including DDoS), defacement, SQLite, malware, backdoors (including misconfigurations), targeted attacks
  4.  Linux/Android operating system
    • Basic setup of Linux/Android operating systems using virtualisation
  5.  Mac/iOS operating system
    • Basic setup of Mac/iOS operating systems using virtualisation
  6.  Windows operating systems
    • Basic setup of Windows operating systems using virtualisation
  7.  Wireless networking
    • Wireless networking protocols
  8.  Encryption
    • How encryption works and its impact on an investigation. Including the difference between encryption types and hashing
  9.  Continuity of evidence & chain of custody
    • How to maintain and ensure chain of custody for digital devices and evidence
  10.  ACPO Principles of Digital Evidence
    • Understanding the four principles: Prepare, Prevent, Protect and Pursue
  11.  Exhibit identification & exhibit seizure
    • Being able to recognise and identify potential sources of digital evidence, and being able to seize different types of storage media
  12.  Games consoles & embedded devices
    • Types, opportunities and timescales for examinations and likely standard outputs
  13.  Home and business network setups
    • Typical setups and configurations. Things to consider for both in terms of opportunities and management of scenes
  14.  Initial live device handling
    • Initial handling of different devices whether live (switched on) or ‘dead box’ (switched off) as well as other devices such as routers
  15.  Legislation and powers
    • CMA, HRA, DPA, RIPA etc.
  16.  Live digital device risks
    • Identification and management of potential risks
  17.  Risk assessments
    • How to complete and review risk assessments
  18.  Scene mapping & scene searching
    • Physical mapping of a scene involving digital evidence sources, including identifying potential lines of enquiry
  19.  Seizures relating to digital media
    • The actual process of safely seizing different forms of digital media
  20.  Servers
    • Types, opportunities and timescales for examinations and likely standard outputs
  21.  The Internet of Things (IoT)
    • Overview of the concept behind IoT

Exam Track

At the end of your accelerated course, you’ll sit the following exam at the Firebrand Training centre, covered by your Certification Guarantee:

Cyber Crime Foundation exam

  • Format: Online and multiple choice