Demystifying Cybercrime (For non-technical audiences)
Cybercrime is on the rise and it now plays a role in more than half of all financial crimes. It also features widely in many other forms of crime, from trafficking to attacks on critical national infrastructure. Unfortunately, most courses addressing this topic are aimed at those with a background in information systems and a good grasp of the jargon.
This course has been designed from the ground up for everyone else. Using simple analogies and practical activities anyone can comfortably participate in, we demystify the complex and provide clear, non-technical guidance for audiences drawn from any sector and any role.
- Get to grips with the fundamentals of internet, web and device technology
- Take the mystery out of bitcoin, blockchain, encryption, hashing and more
- Learn to explain digital technology in layman’s terms, without jargon
- Learn how to think about digital evidential opportunities and challenges
- Understand how criminals use modern technologies to commit or enable offences
- Learn the essentials of cyber security
Who this course is for
Law enforcement, defence sector staff, internal audit, risk management, fraud, security and IT security departments, investigators in the private sector and government, finance, retail, government, legal, insolvency sectors.
This programme is suitable for all regardless of experience. No prior technical training is required
Three days of tutor led training
- Our prices are different for law enforcement and public sector - call us for details
- We can also offer a multiple bookings discount
This course aims to take attendees on a journey from the introductory level of cybercrime awareness, through to the intermediate level. The focus of each of the three days is shown below.
Day One focuses on the landscape. Starting with a case study, we go on to explore the basic concepts that power digital devices, how the internet and the Web work in practice, the types and motives of key threat actors, and the concepts behind cryptography.
Day Two focuses on some of the key types of cybercrime activity. We look at social engineering and conduct a practical online review of a potential target. We then explore database hacking and demonstrate password cracking. We move on to look at various types of malware attack, including ransomware and spyware, before concluding with a look at crypto-currency ransom payments and denial of service attacks.
Day Three focuses on how cybercrime features in complex cases, the Darknet and cybersecurity. We start by reviewing a number of complex case examples involving critical national infrastructure, drugs trafficking, internet of things attacks, and financial crimes. We then look at how the Darknet is used by criminals to monetise and conceal their activities, before concluding with a discussion of the key cyber security concepts that potential targets should consider.
Ongoing feedback throughout the course
This course is certified by the Commissioner of the City of London Police
To book a place on our next programme and see available dates