What You Need to Know Before
You Start

Starts 8 July 2025 23:21

Ends 8 July 2025

00 Days
00 Hours
00 Minutes
00 Seconds
course image

Snookered in the Pool Room

Join us for an insightful session titled "Snookered in the Pool Room," where we unravel the complexities of cybercrime investigation with an unconventional approach. This event takes you through a gripping case study involving a data centre hack, shedding light on key aspects of forensic profiling, the nuances of social engineering, and the e.
44CON Information Security Conference via YouTube

44CON Information Security Conference

2765 Courses


42 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Conference Talk

Optional upgrade avallable

Overview

Join us for an insightful session titled "Snookered in the Pool Room," where we unravel the complexities of cybercrime investigation with an unconventional approach. This event takes you through a gripping case study involving a data centre hack, shedding light on key aspects of forensic profiling, the nuances of social engineering, and the essential role of international law enforcement collaboration.

Hosted on YouTube, this session is a part of our series catering to those passionate about artificial intelligence and cyber security.

Whether you are a seasoned professional or an enthusiast keen on understanding the depths of cybercrime investigations, this talk promises to enrich your knowledge and offer a fresh perspective.

Don't miss out on this opportunity to dive deep into the world of cybercrime and discover the innovative strategies used to tackle it. Tune in for a compelling presentation that blends technical insights with real-world applicability.

Syllabus

  • Introduction to Cybercrime
  • Overview of Cybercrime
    Importance of Investigating Cybercrime
  • Case Study: Data Centre Hack
  • Case Background and Overview
    Timeline of Events
  • Forensic Profiling in Cybercrime
  • Understanding Forensic Profiling
    Tools and Techniques for Digital Forensics
    Analyzing Network and System Logs
  • Social Engineering Tactics
  • Common Social Engineering Techniques
    Psychological Aspects of Social Engineering
    Case Study: Social Engineering in the Data Centre Hack
  • Investigative Methodologies
  • Building a Cybercrime Investigation Framework
    Evidence Collection and Preservation
    Challenges in Cybercrime Investigations
  • International Law Enforcement Collaboration
  • Role of International Organizations (e.g., INTERPOL, Europol)
    Legal Aspects of Cross-Border Cybercrime Investigations
    Case Studies: Collaborative Efforts in Cybercrime Cases
  • Cybersecurity Practices and Prevention
  • Strengthening Cyber Defenses
    Educating Staff on Security Awareness
    Creating an Incident Response Plan
  • Ethical and Legal Considerations
  • Ethical Issues in Cybercrime Investigation
    Understanding Laws and Regulations Pertaining to Cybercrime
    Privacy Concerns and Compliance
  • Course Conclusion and Case Reflection
  • Summary of Key Learnings
    Discussion: Improving Cybercrime Investigation Practices
    Final Thoughts on the Data Centre Hack Case Study

Subjects

Conference Talks