The programme begins with a session providing learners with an understanding of cyber-dependent and cyber-enabled crime. Learners will explore the methodologies that are used to detect cybercrime and evaluate the strategies and processes to reduce threat, risk and harm from such crime. Learners will explore the role and responsibilities of cyber investigation first responders. They will also analyse key legislation that must be adhered to during an investigation.

Key learning points:

  • Understand how to identify and reduce the threat of cyber-dependent/enabled crime
  • Identify the different types and functions of malware and how to reduce the threat from them
  • Understand the role and responsibilities of a cyber investigator and first responder

The programme will then provide learners with an understanding of the techniques used to examine covert and overt computer networks, and the opportunities these provide for cyber investigation plans. Learners will learn how to analyse network logs, traces network routers to extract information. They will also gain an understanding of how deal with victims, witnesses and suspects in relation to cyber investigations.

Key learning points:

  • Determine the function and development of cyber investigative plans
  • Understand the concepts of digital forensics used to identify evidence of a cybercrime
  • Identify the approaches of dealing with victims, witnesses and suspects in a cybercrime

This session will cover the open source information systems and the importance of open source databases, technical archives and social media in cyber investigations. Learners will gain an understanding of the importance of adhering to current legislation, procedures and policies relating to cyber investigations and how these have an impact on cyber investigations and decision-making. Learners will explore how the outcomes of different cybercrime cases in UK and European Courts impact on cyber investigation tactics.

Key learning points:

  • Understand how to identify, secure and preserve digital evidence during a cybercrime investigation
  • Identify the benefits and challenges of open source material in a cybercrime investigation
  • Evaluate the impact of current legislation, procedures and policies on a cybercrime investigation

The face-to-face delivery for the BTEC Level 5 Award programme will end with a session providing learners with an understanding of the importance of preparing and maintaining case files for cyber investigations.
Learners will develop an understanding of the preparation of digital material for prosecutors, tribunals or court hearings. They will analyse sanitisation and redaction issues relating to digital material and explore the importance of preparing material in a format that takes into account the legal and regulatory frameworks of a court or tribunal case.
Learners will also explore the importance of maintaining accurate case files for cyber investigations. They will analyse different case file and risk assessment models that are available to investigators. They will explore the potential threats, such as challenges to the integrity of digital material that may arise and the control measures that could be used to counter these.

Key learning points:

  • Understand the importance of preparing digital material in an appropriate format for lawyers, tribunals and court hearings
  • How to prepare and maintain a case file in a cybercrime investigation

Those who successfully complete the pre-course work, 4-days of face-to-face training and the post course assessment will be eligible for the BTEC Level 5 Professional Award in Cyber Investigations.

Plan Your Training

To discuss your training requirements please contact us by filling in the form below