Course Finder



Module 4 - Detection and Response - part one



  • The three pillars of cybersecurity: detection, prevention and response
  • Strategic threat intelligence
  • Technical preservation of evidence
    • Commissioning digital forensic experts
    • Technical data sources (host, network, devices, etc.)
    • Anti-forensics

  • Attacker attribution
  • Open source intelligence for investigators
    • Search engines
    • Social networks
    • Public databases
    • Sockpuppet accounts

  • Operational security for investigators (OPSEC)

  • Cybercrime information sharing

Learning Target

The learner can apply his/her knowledge of cybercrime and describe key case types from the perspective of the cybercriminal and the investigator.

Target Audience

The certificated course of study is ideal for individuals working in the following fields, who wish to become more professional in their investigation of cybercrime (economic cybercrime).

  • Fighting economic crime
  • Corporate security
  • IT security
  • Internal auditors
  • Internal investigators
  • Members of the police or armed forces



Customised Programmes

Everything we offer in our range of open seminars can be packaged and delivered as tailormade in-house training programmes for companies and organisations. We will be happy to advise you and create an individual offer on request.

Price advantage of 10% from the 2nd participant per company and seminar date.