What You Need to Know Before
You Start
Starts 8 June 2025 06:41
Ends 8 June 2025
00
days
00
hours
00
minutes
00
seconds
Snookered in the Pool Room
Unconventional approach to investigating cybercrime, focusing on a data centre hack case study. Explores forensic profiling, social engineering, and international law enforcement collaboration.
44CON Information Security Conference
via YouTube
44CON Information Security Conference
2544 Courses
42 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Conference Talk
Optional upgrade avallable
Overview
Unconventional approach to investigating cybercrime, focusing on a data centre hack case study. Explores forensic profiling, social engineering, and international law enforcement collaboration.
Syllabus
- Introduction to Cybercrime
- Case Study: Data Centre Hack
- Forensic Profiling in Cybercrime
- Social Engineering Tactics
- Investigative Methodologies
- International Law Enforcement Collaboration
- Cybersecurity Practices and Prevention
- Ethical and Legal Considerations
- Course Conclusion and Case Reflection
Overview of Cybercrime
Importance of Investigating Cybercrime
Case Background and Overview
Timeline of Events
Understanding Forensic Profiling
Tools and Techniques for Digital Forensics
Analyzing Network and System Logs
Common Social Engineering Techniques
Psychological Aspects of Social Engineering
Case Study: Social Engineering in the Data Centre Hack
Building a Cybercrime Investigation Framework
Evidence Collection and Preservation
Challenges in Cybercrime Investigations
Role of International Organizations (e.g., INTERPOL, Europol)
Legal Aspects of Cross-Border Cybercrime Investigations
Case Studies: Collaborative Efforts in Cybercrime Cases
Strengthening Cyber Defenses
Educating Staff on Security Awareness
Creating an Incident Response Plan
Ethical Issues in Cybercrime Investigation
Understanding Laws and Regulations Pertaining to Cybercrime
Privacy Concerns and Compliance
Summary of Key Learnings
Discussion: Improving Cybercrime Investigation Practices
Final Thoughts on the Data Centre Hack Case Study
Subjects
Conference Talks