bg_image
You Can Register on
18 October 2026
Course Info
Trainer/s
Training activity Hours
9
Training activity Date
2026-11-02 - 2026-11-04
Training Activity Days
Start and End Time
17:00 - 20:00
Training Activity Language
English
Methodology
Blended
Type of Training
Short courses
Deadline for registration
Sunday, 1 November 2026, 5:00 PM
Price For Jordanian
72JOD
Price For Non Jordanian
135US$
Description

This course is designed as a proactive approach to introduce the participant to the cybercrime prevention, detection and incident management processes, policies, procedures and cybercrime governance activities. Focuses on a broad overview of cybercrime management standards, guidelines and procedures as well as the implementation and governance of these activities. The course addresses the implications of universal digitalization and emerging digital transformation technologies on creating exposures for cybercrimes as applied to the police and law enforcement domain. The participant will learn about cybercrime fundamentals, modern cybercrime framework, cybercrime exposures and sources of cybercrimes and risk management as well as technology trends and implications. The participant will also learn how to identify cybercrimes, distinguish between different types of cybercrimes, and how to protect themselves from this kind of attack.

Outcomes

1.    Understand the Nature and Classifications of Cybercrimes
2.    Analyze the Psychology and Techniques of Cybercriminals
3.    Identify and Mitigate Major Cyber Threats
4.    Apply Core Cybersecurity Principles and Technologies
5.    Develop Strategies for Cybercrime Prevention and Risk Management

Course Video
Contents

1.    Cybercrime, Cybercriminals, and Classifications of Cybercrimes • Cybercrime Fundamentals • Cybercrime Law • Iterative Approach Methodology for Cybercrimes
2.    The Psychology, Mindset, And Skills of Hackers and Cybercriminals
3.    Tools & Methods Used in Cybercrimes
4.    Personal Data Breach
5.    Phishing / Vishing / Smishing / Pharming
6.    Identity Theft
7.    Credit Card Fraud
8.    Cyber Extortion
9.    Identity Theft and Government Impersonation

10.    Malware Disemination (Virus, Worm, Ransomware, Trojan, Backdoor, …)
11.    Large Scale Attack (Cyberterrosim, Hacktivism,…)
12.    Denial of Service (Dos or DDOS)
13.    Cybervandalism
14.    Software Piracy and Counterfeiting of Programs • Data Leak • Cybercrime Risk Management
15.    Authentication (Multifactor Authentication, SSO, OTP, ...)
16.    Confidentiality and Privacy (Encryption, Anonymization, ...)
17.    Data Integrity
18.    Non-Repudiation
19.    High Availability

20. Traceability and History of Electronic Acts and Actors
21.    Cryptographic Solutions
22. Role of PKI Systems and The Electronic Identification
23. Digital Signature Mechanisms and Standards
24. Cyber Terrorism and Cyber Warfare
25. Cost of Cybercrimes • Cybercrime – Illustrations with Case Studies
26. The Future of Cybercrimes
27.    Recommendation on The Protection of The Cybercrimes for Government, Businesses and Individuals.

Target Group

Government and Law Enforcement Professionals, Corporate Security Teams and IT Professionals, Legal and Compliance Officers, Students and Academics in Cybersecurity or Law, Business Leaders and Entrepreneurs, General Public and High-Risk Individuals

HTML tutorial