Cyber Counterterrorism Investigation and Internet Investigation
Start Date | End Date | Venue | Fees (US $) | ||
---|---|---|---|---|---|
Cyber Counterterrorism Investigation and Internet Investigation | 19 Oct 2025 | 23 Oct 2025 | Dubai, UAE | $ 4,200 | Register |

Cyber Counterterrorism Investigation and Internet Investigation
Start Date | End Date | Venue | Fees (US $) | |
---|---|---|---|---|
Cyber Counterterrorism Investigation and Internet Investigation | 19 Oct 2025 | 23 Oct 2025 | Dubai, UAE | $ 4,200 |
Introduction
The Cyber Counterterrorism Investigations Training Program will give the criminal investigator the necessary tools and training they need to conduct cyber-based investigations and operations against terrorist targets. The target audience will be criminal investigators, detectives, intelligence specialists, and intelligence analysts from the federal, state, and local law enforcement community who are tasked with performing intelligence gathering and analysis, investigations, and operations against known and unknown terrorist targets or threats.
The study of the cybercriminal can be one of the most complex topics facing the law enforcement professional today and will require a multidisciplinary approach supported by technical expertise that was not needed with a traditional crime. In this innovation age that law enforcement now faces, we must look at more than just the behavioral and social sciences. We now have to include engineering and technology to assist investigators in bridging the gaps. To control, or at least combat this type of crime, it will be essential to examine the behavior of the cyber-criminal. The Internet Investigations Training modules will focus on investigations and operations centered on the use of the internet and its many communities that are being exploited day today.
Digital technology has opened the door to various areas of criminal activity. The most prevalent are intrusions within government and private-sector computer systems. Service attacks are a hacker's dream and the use of the internet has warranted more pornographic activity as well as giving criminals added stalking capabilities. Credit card information is easily compromised and so are individuals’ identities and financial history. The Internet Investigations Training provides a basis of training to perform audit trails, sensitize individuals of the dangers of online surfing, and serves as a resource tool to minimize hacking activity. Legal and ethical considerations are discussed for all phases of Internet investigations. This program will expose students to the fundamentals of Internet architecture and services and cover methodologies of gathering evidence both real-time and offline from client and server systems connected to the Internet. The Internet Investigations Training will give the criminal investigator or analyst, the basic tools and training they need to begin conducting cyber-based investigations.
Objectives
- Cybercrime and Cyberterrorism - concepts, definitions, terminology, types, threats
- Cyber/digital evidence/forensics - identification, preservation, collection, analysis, classification, comparison/examination, interpretation)
- Information security and current hacking trends
- Protection of key infrastructure from terrorist cyber attacks
- The insider threat - radicalization of cybersecurity personnel
- Terrorist investigation using the Internet and Social Media, open-source intelligence (OSINT)
- Legal instruments at various levels on handling cybercrime, digital evidence, mutual legal assistance
- Investigation of digital evidence - collection and examination - tools, processes, techniques, phases, and processes
- Identification, interpretation of digital evidence - authorization, access, understanding, preserving, etc.
- Analysis of digital evidence - tools, classification/categorization, examination/evaluation
- Presentation and documentation of digital evidence - converting to understandable versions with explanations without tampering with the value and meaning of the evidence
- Digital evidence ineffective prosecution - understand, defend, and proof.
Training Methodology
This is an interactive course. There will be open question and answer sessions, regular group exercises and activities, videos, case studies, and presentations on best practice. Participants will have the opportunity to share with the facilitator and other participants on what works well and not so well for them, as well as work on issues from their own organizations. The online course is conducted online using MS-Teams/ClickMeeting.
Who Should Attend?
- Professionals and leaders who wish to learn more about cybersecurity strategies, information governance, and ISO standards
- Personnel who work in IT systems management, legal, risk management, information security, projects, HR, and procurement
- Personnel moving into management and IT security roles who wish to learn about the latest trends in cybersecurity, information audit and risk management
Course Outline
- Cyber Capabilities of Terrorists
- Legal
- Internet Technology
- Cyber OPSEC
- Web site identification methodology and DNS
- Web-based Investigation methodology and tracking tools
- Terrorists Financing
- Practical Exercise
- What is the Internet?
- Fundamentals to Cyber Crime Investigations
- Setting up an Investigative Computer
- Xbox Live Investigations
- Google Hacking Techniques
- Email Trace Investigations
- Voice Over Internet Protocol Overview
- Instant Messaging and Chat rooms
- Myspace: Stalking the Stalker
- Forums and Newsgroups
- Peer to Peer Investigations
- Practical Exercises
- Students will be issued hardware and software associated with the investigation of cybercrimes committed upon the internet and networks.