Cyber Crimes: the first comprehensive training programme for professionals dealing with this area
A multi-tiered training classes to help tackle the growing problem of cyber crime

"The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb".
– National Research Council, "Computers at Risk"

February 2010. Problems such as phishing, identity theft and subsequent fraud, electronic espionage and theft of service, malicious cracking, spam proliferation and worm/virus propagation are becoming more and more pervasive as technology inexorably advances, posing a serious threat to national critical infrastructures (NCI), corporate entities, governing bodies and, of course, end-users.

Everyone has a stake in securing our increasingly networked world: failure to stay up to date on the latest threats, trends and technologies can result in staggering economic loss, loss of trust, or even loss of life.

UNICRI has been researching the growing realm of cyber crime and, in conjunction with, is proud to offer the following multi-tiered training classes to help tackle the growing problem of cyber crime:

  • Information Security (InfoSec) course given in Basic-level over the period of 3 days, geared towards non-technical audiences who wish to gain a deeper understanding of this growing threat: attorneys, prosecutors, non-technical law enforcement agents, network administrators, technical advisors and legal assistants are example participants. Covered topics include: attack trends and the evolution of cyber crime, existing information security standards, the concept of proactive security and unorthodox attack vectors seen in the wild.

  • Information Security (InfoSec) course given in Intermediate or Advanced levels, each 5 days in duration. These are both aimed at technically proficient audiences such as senior network administrators, security consultants, technically-inclined law enforcement personnel as well as risk analyst managers and those licensed to practice law with a strong technical background. The courses delve into the ISO standards and PCI-DSS in deep detail, and include hands-on lab sessions showcasing many “penetration test” techniques: information gathering, automated vulnerability assessments, manual web application testing, and identifying remote systems and services.

  • Hacker Profiling Project (HPP) courses given in Basic (3 days) and Intermediate & Advanced formats (both 5 days). An audacious class with the ultimate goal of applying classical criminal profiling techniques to the hacking culture, “outlining the criminal profiles of the different types of hackers, with particular emphasis on their possible involvement in transnational organised crime activities and cyber-terrorism” (Link). Participants will leave with cutting-edge knowledge on hacker’s motivations, target selection, and their ethics as well as access to the Hacker Profiling Project’s data on over 1200 hackers interviewed via anonymous questionnaire.

  • Digital Forensics course offered in a 2-day Basic-level class outlining computer crimes in our day and age, conventional crimes involving IT media (ie: cell phones, home computers), and common anti-forensic techniques as well as the importance of digital forensics. The course includes a special guest from CLUSIT.

  • Digital Forensics course offered in Intermediate and Advanced levels, lasting 4 and 7 day respectively. The courses will outline the methodology used in digital forensic investigations, file system essentials, timeline and incident verification, the acquisition of volatile or “live” data, how to establish a chain of custody, how to build an open-source forensics lab, an overview of network and mobile forensics, common anti-forensic techniques, and in-depth “hands-on” analysis of Windows, Unix and Mac OSX environments.

SCADA & NCI courses in Basic (3 days) and Intermediate (5 days) levels showcasing examples of automated infrastructures and the existing standards in-place to protect them, an analysis of the problems currently hindering SCADA security, common attack techniques and best practices to harden a SCADA infrastructure from attacks, as well as a live lab session in the Intermediate class to better illustrate the points.




Start Date

Signup deadline

Information Security (3 days)

Feb. 2 2010

January 15 2010

Hacker Profiling Project (3 days)

Feb. 23 2010

February 15 2010

SCADA & NCI (3 days)

Mar. 16 2010

March 8 2010

Digital Forensics (2 days)

Mar. 29 2010

March 22 2010




Start Date

Signup deadline

Information Security (5 days)

Feb. 8 2010

February 1 2010

Hacker Profiling Project (5 days)

Mar. 1 2010

February 25 2010

SCADA & NCI (5 days)

Mar. 22 2010

March 16 2010

Digital Forensics (4 days)

Apr. 12 2010

April 5 2010




Start Date

Signup deadline

Information Security (5 days)

Feb. 15 2010

February 8 2010

Hacker Profiling Project (5 days)

Mar. 8 2010

March 1 2010




Digital Forensics (7 days)

Apr. 19 2010

April 12 2010

Contact Us Disclaimer | Acknowledgements