Contact information
Our address
Silver Tower - Burj Khalifa - District Office - 1704 Dubai - UAE
Follow us

Criminal Evidence and Digital Investigations

Home.Information Technology Management.Criminal Evidence and Digital Investigations

Criminal Evidence and Digital Investigations


Practical sessions and group discussions after attending video sessions and live application presentations.

Course Objectives:

Participants will be able to:

  • Apply the methodology of digital forensic in an operational environment.
  • Develop a strategy to determine the digital forensic response framework.
  • Conduct investigations in social media, malware, and viruses.
  • Manage the digital crime scene, digital evidence, and artifacts.
  • Investigate mobile technologies and other media carrying digital and artifact materials.
  • Apply image extraction techniques from forensic systems.

Target Audience:

This course is designed for IT professionals, fraud investigators, auditors, CSIRT, and SOC analysts working in companies vulnerable to digital attacks. It also benefits police officers, military personnel, behavior monitoring officers, and other security individuals dealing with electronic investigations.

Program Content:

  • Digital forensic anatomy: Background and legal information.
  • Introduction to forensic science.
  • Terminology and definitions.
  • Digital crime series.
  • Overview of digital crimes.
  • Real-life case studies.
  • Digital criminal laws.
  • Digital criminal legislation.
  • Digital forensic evidence standards.
  • Digital forensic basics.
  • Risks faced by organizations.
  • Digital forensics response framework.
  • First Digital Forensics Responder Toolkit.
  • Digital crime scene management.
  • Security Operations Center (SOC).
  • CSIRT (Computer Security Incident Response Team).
  • Roles and responsibilities.
  • Implementation of a framework.
  • Case management.

Digital Evidence Collection and Processing:

  • Domain Name System (DNS).
  • Extended security infrastructure.
  • Investigation of mobile technologies.
  • Seizing digital evidence and tools.
  • Handling digital evidence and tools.
  • Processing digital evidence and tools.
  • Case management protocols.
  • Wireless protocols.
  • Support techniques.
  • Reporting practices.

Investigations in Internal and External Cyber Crimes:

  • Open Source Intelligence (OSINT).
  • Role in digital forensic investigations.
  • Definition of internal crimes.
  • Definition of external crimes.
  • Exploitation of children and investigations.
  • Malware applications.
  • Ransomware.
  • Counter-crime capabilities.
  • Digital forensics and terrorism.

Leave a reply

Our company provides consulting services for small, medium and large businesses.

Our Locations
Criminal Evidence and Digital Investigations

© 2023 All rights reserved.

Scroll to top