• Day #1

    The first day's sessions include the following:

    • Session 1 - Course opening
    • Session 2 - Cybercrime: threats
    • Session 3 - Introduction to technology
    • Session 4 - Identifying suspects on the internet 
    • At the end of this session participants will be able to:

      • Discuss the overall aim of the course
      • Explain why this course is necessary
      • List the component parts of the timetable and activities of the course
      • List the health and safety procedures for the venue
    • At the end of this session, delegates will be able to:

      • Identify different types of cybercrime and their impact.
      • List the threats, trends and tools of cybercrime and responses to the phenomenon.
      • Explain the concepts of cybercrime that are considered types of crime under most legislation and international standards.
      • Analyse the needs and the advantages of the harmonisation between national legislation and the international instruments, in particular the Budapest Convention.
    • At the end of this session participants will be able to:

      • Identify different computer operating systems.
      • Explain the basics of how networks function.
      • Describe the functions of the Internet.
      • Identify at least 5 major Internet applications.
      • Explain how the Internet has developed from its beginning to today.
      • Differentiate between different Internet applications.
      • Describe the difference between the Darknet and the Deepweb.
      • Explain the basics of virtual currencies Identify how criminals use the various Internet applications.
    • At the end of this session, delegates will be able to:

      • Describe how you can find a suspect IP address.
      • Describe how you can associate a suspect IP address with a real person.
      • Describe technical challenges to identification of suspects on the Internet.