What You Need to Know Before
You Start

Starts 8 June 2025 06:41

Ends 8 June 2025

00 days
00 hours
00 minutes
00 seconds
course image

Snookered in the Pool Room

Unconventional approach to investigating cybercrime, focusing on a data centre hack case study. Explores forensic profiling, social engineering, and international law enforcement collaboration.
44CON Information Security Conference via YouTube

44CON Information Security Conference

2544 Courses


42 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Conference Talk

Optional upgrade avallable

Overview

Unconventional approach to investigating cybercrime, focusing on a data centre hack case study. Explores forensic profiling, social engineering, and international law enforcement collaboration.

Syllabus

  • Introduction to Cybercrime
  • Overview of Cybercrime
    Importance of Investigating Cybercrime
  • Case Study: Data Centre Hack
  • Case Background and Overview
    Timeline of Events
  • Forensic Profiling in Cybercrime
  • Understanding Forensic Profiling
    Tools and Techniques for Digital Forensics
    Analyzing Network and System Logs
  • Social Engineering Tactics
  • Common Social Engineering Techniques
    Psychological Aspects of Social Engineering
    Case Study: Social Engineering in the Data Centre Hack
  • Investigative Methodologies
  • Building a Cybercrime Investigation Framework
    Evidence Collection and Preservation
    Challenges in Cybercrime Investigations
  • International Law Enforcement Collaboration
  • Role of International Organizations (e.g., INTERPOL, Europol)
    Legal Aspects of Cross-Border Cybercrime Investigations
    Case Studies: Collaborative Efforts in Cybercrime Cases
  • Cybersecurity Practices and Prevention
  • Strengthening Cyber Defenses
    Educating Staff on Security Awareness
    Creating an Incident Response Plan
  • Ethical and Legal Considerations
  • Ethical Issues in Cybercrime Investigation
    Understanding Laws and Regulations Pertaining to Cybercrime
    Privacy Concerns and Compliance
  • Course Conclusion and Case Reflection
  • Summary of Key Learnings
    Discussion: Improving Cybercrime Investigation Practices
    Final Thoughts on the Data Centre Hack Case Study

Subjects

Conference Talks