Successful handling of a security situation within your company requires individuals to be specifically trained in a number of technical areas including filesystem implementation, operating system design and knowledge of possible network and host attack vectors. The Scan Professional Services team can deliver various training courses to cover both the theory of digital forensics and incident response, as well as offering training to gain hands-on experience using the same types of evidence and situations you would see in a real world event. We can also offer bespoke training in consultation with clients. Everybody involved in Scan Professional Security Training is a specialist in their own field, having gained that experience through a law enforcement, military, intelligence or specialist career – learn more about our security consultants.
Course Type | Description | Length |
---|---|---|
Use of Online False Personas in Investigations Module | This is a hands on, practical module designed to enable delegates to build, maintain and deploy Online False Personas for use in Internet based investigations. This module is aimed at Passive Online False Personas deployed in a manner enabling them to be adopted by Undercover Operatives when necessary. | This module is designed to be delivered over 1 day. |
Open Source Investigation, the Internet and Compromise | This is an introductory session for law enforcement professionals who use the Internet to conduct research or investigations, those who wish to protect themselves online and a refresher session for those who have undertaken training in these areas. | This module will last for 6 hours. |
Core Skills Internet and Open Source Investigation Module | This hands on and practical module is designed for those who use the Internet to conduct research or investigations and forms the basis for further training. | This module is designed to be delivered over 3 days. |
Intermediate Open Source Investigation Module | This is a hands on, practical and immersive module suitable for those who use the Internet to conduct open source investigations or intelligence research. Delegates will undertake a number of online exercises throughout the module with a final exercise using the skills developed throughout the module. | This module is designed to be delivered over 4 days. |
Cybercrime Investigator (Foundation) | This is a hands on, practical and immersive module suitable for those who investigate Cyber Enabled and Cyber Dependent Crime. Delegates will undertake a number of online exercises throughout the module with a final exercise using the skills developed throughout the module: • Investigation strategy • Build your case file • Witness statements • Exhibits & Chain of Custody • Open Source sites & tools • Forensic Tools • Forensic imaging • Introduction to Networks • Introduction to investigating cybercrime |
This module is designed to be delivered over 4 days. |
Cybercrime Investigator (Advanced) | This is a hands on, practical and immersive module suitable for those who investigate serious and complex Cyber Enabled and Cyber Dependent Crime. Delegates will undertake a number of online exercises throughout the module, designed to build on the Foundation course, and will finish with a final exercise using the skills developed throughout the module: • How to conduct investigations into online criminal activities? • Technical tools used in the commission of cybercrime • Wi-Fi in cybercrime investigations • Deep and dark Web in cybercrime. • Investigation of Unix based systems • International organisations and partners that can support a complex cybercrime investigation • Prepare and present case papers to a prosecutor as they relate to a complex cybercrime investigation |
This module is designed to be delivered over 4 days. Delegates should have attended the Cybercrime Investigator (Foundation Module) or similar. |
Bespoke Cybercrime Course | This is a hands on, practical and immersive module suitable for those who investigate Cyber Enabled and Cyber Dependent crime. Delegates will undertake a number of online exercises throughout the module with a final exercise using the skills developed throughout the module. The module combines Open Source and Internet Investigation techniques, together with foundation level technical knowledge. | This module is designed to be delivered over 5 days. |
Scan 3XS offers a wide range of professional services, fully customisable to your requirements. Please contact us for further information and pricing.