About this course

Course type Premium
Course code QAIDIGINV
Duration 3 Days

This course provides delegates with a practical introduction to online investigation techniques and best practice procedures. Providing delegates with an introduction to the realities of online investigation, intelligence gathering and digital forensics. Though a task based course, delegates will have exposure to theoretical frameworks, which will add insight and value to their hands-on learning. This course will enable delegates to think critically about intelligence and investigation and offer a platform for further learning.

Prerequisites

There are no specific prerequisites for this course, however, participants are expected to have a general understanding of computers, the internet and basic evidential capture.

Intended Audience:
Security practitioners, UK law enforcement or government employees that are required to capture digital evidence or undertake digital investigations. Additionally, anyone in the private sector who works alongside government or who prepares digital evidence for court and regulatory bodies or internal audit and investigations. Our instructors who teach this course are experts in this field, with law enforcement and wider government backgrounds in digitial investigations and forensics.

On this course delegates will obtain

  1. A introduction into the values and obstacles of online investigation and the need for a skilful understanding of cyberspace using real world examples and guided discussion with case studies

  2. A look at the digital space, introducing delegates to the architecture of the internet, its actors, and how devices communicate. The aim of this module is to equip delegates with a jargon free understanding of networking.

  3. This module exposes delegates to the sheer masses of data available, looking particularly at social media, online records and marketplaces. Introduce delegates to advanced Google search methodology. - Case Study: The Enc0d3r - Digital footprint of a web pirate

  4. Expose delegates to the wide gamut of verified investigative tools with hands-on exercises on how they are utilised in an inquiry.

  5. Explaining the uses, techniques and developments in cryptography

  6. This module will introduce digital forensics as tool for investigation. Looking at where, when and how it is used, and its value.

  7. A practical case study will expose delegates to a realistic scenario where items will need to be seized to discover evidence and intelligence. This module will demonstrate the challenges to law enforcement and forensic examiners with what items to look out for, which items may contain useable data, the tricks of anti-forensics and finally the issues of bringing forensic evidence to court.

  8. Digital evidence usually involves a large amount of data being captured and investigated. This module provides practical exposure to the challenges of large data sets and the standardised format explaining that evidence.

  9. Delegates will be presented with a range of legislation relevant to internet investigation, intelligence and evidence handling, such as DPA, HRA, CMA, RIPA, PACE

  10. Discussion with delegates of emerging threats, new technologies and future strategy

Course Outline

Module 1 - Introduction to Digital Investigations

  • A introduction into the values and obstacles of online investigation and the need for a skilful understanding of cyberspace using real world examples and guided discussion with case studies

Module 2 - The Digital space

  • A look at the digital space, introducing delegates to the architecture of the internet, its actors, and how devices communicate. The aim of this module is to equip delegates with a jargon free understanding of networking.

Module 3 - Sources of Intelligence for Digital Investigators

  • This module exposes delegates to the sheer masses of data available, looking particularly at social media, online records and marketplaces. Introduce delegates to advanced Google search methodology. - Case Study: The Enc0d3r - Digital footprint of a web pirate

Module 4 - Tools and techniques of digital investigation

  • Expose delegates to the wide gamut of verified investigative tools and how they are utilised in an inquiry.

Module 5 - Encryption

  • Explaining the uses, techniques and developments in cryptography

Module 6 - Digital Forensics: What is Forensics and where is it used?

  • This module will introduce digital forensics as tool for investigation - will look at where and how it is used, and its value.

Module 7 - Digital Forensics: case study task

  • This case study will expose delegates to a realistic scenario where items will need to be seized to discover evidence and intelligence. This module will demonstrate the challenges to law enforcement and forensic examiners with what items to look out for, which items may contain useable data, the tricks of anti-forensics and finally the issues of bringing forensic evidence to court.

Module 8 - Digital intelligence production and 5x5x5 documents

  • Digital evidence usually involves a large amount of data being captured. The intelligence gained must be produced in a standardised format explaining that evidence.

Module 9 - Legislation: What you need to know

  • Delegates will be presented with a range of legislation relevant to internet investigation, intelligence and evidence handling, such as DPA, HRA, CMA, RIPA, PACE
Premium Course

3 Days

Duration

This course is authored by QA

Delivery Method

Delivery method

Classroom / Attend from Anywhere

Receive classroom training at one of our nationwide training centres, or attend remotely via web access from anywhere.

Find dates and prices

Online booking is currently not available for this course, to find out more please call us on 0345 074 7998 or email us at info@qa.com to discuss how we can help.

Project Management training from QA
Complete Cyber Analyst

Hand picked by our experts, these interlocking skills enable the Complete Cyber Analyst.

Trusted, awarded and accredited

Fully accredited to ensure we provide the highest possible standards in learning

All third party trademark rights acknowledged.