Cyber Security: Cybercrime & Forensics Fundamentals
Duration – 10 Days
Course Objectives
- Understand what cybercrime is and how it works.
- Learn how cyberattacks are planned and executed.
- Explore mobile, wireless, and organizational security issues.
- Study real-world cybercrime cases and prevention methods.
- Know legal rules and compliance like GDPR and IT Act.
Hardware and Software tools
- Processor: i3 or above
- RAM: 4 GB (8 GB better)
- Internet: Stable connection
- Tools: Wireshark, Nmap, VirtualBox, Chrome, Notepad++, PowerPoint, Virus Total
Pre-requisites
- Basic computer and internet usage
- Familiar with emails and websites
- Interest in cybersecurity and tech
Take away
- Basics of cybercrime and its types.
- How hackers plan and perform attacks.
- Mobile-based threats like Smishing, SIM-swap.
- Tools used by cybercriminals: malware, DoS attacks, etc.
- Cybersecurity practices for individuals and companies.
- Real attack case studies and prevention tips.
Day – 1: Chapter 1
Introduction to Cybercrime
· 1.1 Understanding Cybercrime
· 1.2 Historical Evolution and Milestones
· 1.3 Characteristics and Scope
Day – 2:
· 1.4 Categories of Cybercrime
· 1.5 Major Cybercrime Incidents
· 1.6 Need for Cybercrime Awareness and Education
Day – 3: Chapter 2
Cyber Offenses – How Criminals Plan Them
· 2.1 Stages of Cyber Offenses: From Reconnaissance to Exploitation
· 2.2 Target Selection and Vulnerability Analysis
· 2.3 Planning Tools and Techniques
Day – 4:
2.4 Organizational Structures of Cybercrime Groups
2.5 Real-World Attack Case Studies
2.6 Prevention through Threat Modeling
Day – 5: Chapter 3
Cybercrime Involving Mobile and Wireless Devices
· 3.1 Rise of Mobile-Based Threats
· 3.2 Malware on Smartphones and Tablets
Day – 6:
3.3 SMS Phishing (Smishing) and Rogue Applications
3.4 Bluetooth and Wi-Fi Attacks
3.5 SIM-Swap and Mobile Identity Theft
Day – 7: Chapter 4
Tools and Methods Used in Cybercrime
4.1 Common Attack Vectors
4.2 Malware Types: Viruses, Ransomware, Trojans
4.3 Social Engineering Tactics
Day – 8:
4.4 Exploit Kits and Dark Web Marketplaces
4.5 Denial-of-Service (DoS/DDoS) Attacks
4.6 Encryption Abuse and Steganography
Day – 9: Chapter 5
Cybersecurity – Organizational Implications
5.1 Importance of Cybersecurity in Modern Organizations
5.2 Common Threats to Enterprises
5.3 Security Policies and Governance Frameworks
Day – 10:
5.4 Incident Detection and Response Planning
5.5 Employee Training and Insider Threats
5.6 Regulatory Compliance (e.g., GDPR, IT Act)
5.7 Future Challenges and Strategic Recommendations