Skip to content

10 - Course introduction

This online course familiarizes you with digital forensics investigation of a cyber attacks. The course includes extensive information on cyber threats and the most common network attack methods used by cybercriminals. The course provides you with a systematic approach to the examination of a cyber-attack within an organization when it suspects that it has been the victim of a cybercrime.

The course content is approached through a fictitious case scenario where any association with actual crime events or actors is purely coincidental. The digital evidence presented in the chosen case scenario has been made up for the learning purposes, and it is not intended to reflect a real life investigation. The case scenario is meant to serve as a prop for handling the topic of the course.

The course consists of the theory presented on this website as well as practical exercises related to the theoretical part. The course assignment can be completed independently from student's own workstation at the time best suitable for you. The background requirements for the performance of the course assignment have been described in more detail in the website’s subsections.

The course supports the preparation for the Flagship 1 cyber security exercise, where the case scenario continues from the point that the online course has reached. However, participation in the course is not a prerequisite for the cyber security exercise. Participants in the cyber security exercise will receive the necessary background information about the events occurring during the online course.