ASCL Certified Cyber Crime Investigator

Master the art of Cyber Crime Investigation with the CCI+ course

Cyber Crime Investigators play a crucial role in eCommerce companies, audit firms, banks, IT companies, Government, police, enforcement & military agencies agencies and manufacturing companies.

We live in a world where everything seems to be getting hacked - not just laptops, smartphones & websites but also cars, aeroplanes, ships, drones, self aiming rifles, ships, CCTV cameras, medical devices, bitcoin wallets, smart-watches and more...

The ASCL Certified Cyber Crime Investigator + course prepares you to handle cases involving digital evidence and cyber trails.

Cyber Crime Investigators are an integral part of:

  • Information Security teams,
  • Incident Response teams,
  • Fraud Control teams.

These teams are crucial in eCommerce companies, audit firms, banks, IT companies, Government agencies and manufacturers.

Cyber Crime Investigators are also required by police, enforcement and military agencies.

Cyber Crime costs the world more than Rs. 57,000,000,000,000 every year. Companies and Governments need skilled cyber crime investigators to contain this US $ 114 billion annual cost.

The 25 skills every cyber crime investigator must have

  1. Basic Web Programming skills.
  2. Working knowledge of Web Technologies.
  3. Strong working knowledge of Web Hacking.
  4. Effective suspect interviewing skills.
  5. Thorough understanding of documentation.
  6. Sound knowledge of the relevant law.
  7. Practical knowledge of phishing tools, techniques and counter-measures.
  8. Strong knowledge of the working of Virtual Payment Systems.
  9. Understanding of financial instruments and concepts.
  10. Basic understanding of forensic accounting.
  11. Practical knowledge of Fraud Investigation.
  12. Practical knowledge of investigating Bitcoin & other crypto-currencies.
  13. Strong understanding of malware incident prevention & incident response
  14. Thorough practical knowledge of the Dark Web.
  15. Strong practical knowledge of email investigation.
  16. Thorough practical knowledge of Server Log analysis.
  17. Strong practical knowledge of browser forensics
  18. Thorough understanding of Social Media Forensics.
  19. Thorough understanding of the Google Ecosystem & its Forensics.
  20. Strong working knowledge of forensic technologies.
  21. Understanding of the ISO/IEC 27037 standard.
  22. Basic working knowledge of cyber security.
  23. Working knowledge Cryptography & Steganography.
  24. Strong practical knowledge of password recovery & forensics.
  25. Updated knowledge of the latest cyber attacks around the world.

As per Ministry of Human Resources Development estimates - India needs 2.5 lakh cyber experts and professionals to effectively tackle cyber crimes. (Source: Times of India Feb 10, 2011).

Course History

This course was launched in February 2002. In the last 13 years it has been completed by 1000s of participants including:

  • Police Officers,
  • Lawyers & law students,
  • IT professionals & Engineering students,
  • Chartered accountants & CA students,
  • Company Secretaries & CS students,
  • Tax & other Government officials,
  • Military personnel,
  • Management Professionals,
  • Commerce Graduates and students.

The ASCL Certified Cyber Crime Investigator + course was launched in February 2002. In the last 13 years it has been completed by 1000s of participants.

Course Syllabus

This course has 24 modules:

  1. Cyber Crime - Global Scenario
  2. Web Technologies
  3. Web Programming
  4. Web Hacking & Investigation
  5. Suspect Interviewing
  6. Documentation & Legal Issues
  7. Phishing
  8. Virtual Payment Systems
  9. Investigating Financial Crimes
  10. Forensic Accounting
  11. Fraud Investigation
  12. Bitcoin Forensics
  13. Malware
  14. Dark Web
  15. Email Investigation
  16. Investigating Server Logs
  17. Browser Forensics
  18. Social media forensics
  19. Google ecosystem & forensics
  20. Forensic Technologies
  21. Cyber Security Fundamentals
  22. Cryptography & Steganography
  23. Password Forensics
  24. Real World Case Studies