Introductory Judicial Training for Judges, Magistrates and Prosecutors
-
Day #1
The first day's sessions include the following:
- Session 1 - Course opening
- Session 2 - Cybercrime: threats
- Session 3 - Introduction to technology
- Session 4 - Identifying suspects on the internet
-
1.0 Mbayt Powerpoint 2007 presentation
At the end of this session participants will be able to:
- Discuss the overall aim of the course
- Explain why this course is necessary
- List the component parts of the timetable and activities of the course
- List the health and safety procedures for the venue
-
5.9 Mbayt Powerpoint 2007 presentation
At the end of this session, delegates will be able to:
- Identify different types of cybercrime and their impact.
- List the threats, trends and tools of cybercrime and responses to the phenomenon.
- Explain the concepts of cybercrime that are considered types of crime under most legislation and international standards.
- Analyse the needs and the advantages of the harmonisation between national legislation and the international instruments, in particular the Budapest Convention.
-
33.4 Mbayt Powerpoint 2007 presentation
At the end of this session participants will be able to:
- Identify different computer operating systems.
- Explain the basics of how networks function.
- Describe the functions of the Internet.
- Identify at least 5 major Internet applications.
- Explain how the Internet has developed from its beginning to today.
- Differentiate between different Internet applications.
- Describe the difference between the Darknet and the Deepweb.
- Explain the basics of virtual currencies Identify how criminals use the various Internet applications.
-
1.5 Mbayt Powerpoint 2007 presentation
At the end of this session, delegates will be able to:
- Describe how you can find a suspect IP address.
- Describe how you can associate a suspect IP address with a real person.
- Describe technical challenges to identification of suspects on the Internet.