Cybercrime Insight for Law Enforcement

Course Preview

Course Author(s)

Dr. Thomas Hyslip, Gary Rudd

Course Summary

In today’s web connected, social networking, smartphone, phishing and hacking cybercriminal world in which we all live-in and struggle with, this is a must course for law enforcement professionals to gain a deeper understanding what is going on behind the screens, social networking sites, and other technologies.

Dr. Thomas Hyslip and his colleague Gary Rudd are both world-class experts in Cybercriminal prevention as their titles above reflect. They both have generously cooperated with TRN to produce this excellent course for professional law enforcement in order for LE professionals to gain a deeper understanding of the web, social networking and mobile phone technology when interacting with suspected individuals that may be wanted on an arrest warrant or in tracking information down about a prospective individual under surveillance or other reasons.

The course covers the following topics in detail:

  • The Digital Footprint

  • Computer Forensics

  • Digital Evidence

  • Networking Fundamentals in a Nutshell

  • The IP Address

  • IP Addresses in the “Wild”

  • Digital Footprints Are Everywhere

  • Apple iPhone Map App

  • Social Media

  • Facebook & Instagram

  • Logs & History

  • Cell Phone Examples

  • Financial Crime Response Example

  • Cyber Threat Email Example

  • Central Ops

  • Exchangeable Image File(s)

  • Preservation Letters

Course Syllabus

  • Cybercrime Insight - Module 1

    • Introduction
    • Computer Forensics
    • Digital Evidence
    • Networking Fundamentals in a Nutshell
    • The IP Address
    • IP Addresses in the Wild
    • IP Addresses in the Wild - Continued
    • Digital Footprints Are Everywhere
    • Apple iPhone Map Applications
    • Social Media
    • Facebook and Instagram
    • Logs and History
  • Cybercrime Insight - Module 2

    • Cell Phone Example
    • Financial Crime Response Example
    • Cyber Threat Email Example
    • Cyber Threat Email Example - Continued
    • Central Ops
    • Exif Data
    • Follow the Same Process
    • Preservation Letters
    • Resources
    • Module Assessment