Course Outline
- Cyber criminology
- Introduction to the attack process
- Introduction to attack vectors
- Social networks (i.e. attacks via facebook, twitter, etc.)
- Dark and hidden web
- Threat actors
- Data Collection
- Social Media
- OSINT
- HUMINT
- SOCMINT
- Reconnaissance
- Online services and tools
- Metadata Encryption & Decryption
- Digital signatures
- Online investigations
- Crime Scene Management
- Documenting evidence
- Investigation Process
- Chain of Evidence
- Protocols and emails
- URL’S & DNS information
- Timelines
- Decryption and deciphering
- Virtual Currencies
- Matric certificate or equivalent qualification.
- Although a formal IT qualification or certification is not required, it will be beneficial to have some knowledge of computer systems.
- Internet access and PC or laptop on which applications can be installed and services accessed.
4-months