Cyber Security: Cybercrime & Forensics Fundamentals
Durations – 12 Days
Pre-requisites
- Basic computer and internet usage
- Familiar with emails and websites
- Interest in cybersecurity and tech
Hardware and Software tools
- Processor: i3 or above
- RAM: 4 GB (8 GB better)
- Internet: Stable connection
- Tools:
- Wireshark
- Nmap
- VirtualBox
- Chrome
- Notepad++
- PowerPoint
- Virus Total
Takeaway
- Basics of cybercrime and its types
- How hackers plan and perform attacks
- Mobile-based threats like Smishing and SIM-swap
- Tools used by cybercriminals such as malware and DoS attacks
- Cybersecurity practices for individuals and companies
- Real attack case studies and prevention tips
Day – 1: Chapter 1 Introduction to Cybercrime
- 1.1 Understanding Cybercrime
- 1.2 Historical Evolution and Milestones
- 1.3 Characteristics and Scope
Day – 2:
- 1.4 Categories of Cybercrime
- 1.5 Major Cybercrime Incidents
- 1.6 Need for Cybercrime Awareness and Education
Day – 3: Chapter 2 Cyber Offenses – How Criminals Plan Them
- 2.1 Stages of Cyber Offenses: From Reconnaissance to Exploitation
- 2.2 Target Selection and Vulnerability Analysis
- 2.3 Planning Tools and Techniques
Day – 4:
- 2.4 Organizational Structures of Cybercrime Groups
- 2.5 Real-World Attack Case Studies
- 2.6 Prevention through Threat Modeling
Day – 5: Chapter 3 Cybercrime Involving Mobile and Wireless Devices
- 3.1 Rise of Mobile-Based Threats
- 3.2 Malware on Smartphones and Tablets
Day – 6:
- 3.3 SMS Phishing (Smishing) and Rogue Applications
- 3.4 Bluetooth and Wi-Fi Attacks
- 3.5 SIM-Swap and Mobile Identity Theft
Day – 7: Chapter 4 Tools and Methods Used in Cybercrime
- 4.1 Common Attack Vectors
- 4.2 Malware Types: Viruses, Ransomware, Trojans
- 4.3 Social Engineering Tactics
Day – 8:
- 4.4 Exploit Kits and Dark Web Marketplaces
- 4.5 Denial-of-Service (DoS/DDoS) Attacks
- 4.6 Encryption Abuse and Steganography
Day – 9: Chapter 5 Cybersecurity – Organizational Implication
- 5.1 Importance of Cybersecurity in Modern Organizations
- 5.2 Common Threats to Enterprises
- 5.3 Security Policies and Governance Frameworks
Day – 10
- 5.4 Incident Detection and Response Planning
- 5.5 Employee Training and Insider Threats
- 5.6 Regulatory Compliance (e.g., GDPR, IT Act)
- 5.7 Future Challenges and Strategic Recommendation
