| # | Topic Title | Lecture (hours) |
Seminar (hours) |
Independent (hours) |
Total (hours) |
Resources |
|---|---|---|---|---|---|---|
| 1 |
Taxonomy of modern cybercrimes and cyber threats |
2 | 2 | 7 | 11 |
|
|
|
||||||
| 2 |
Investigation of Advanced Persistent Threats (APT) and state-sponsored attacks |
2 | 2 | 7 | 11 |
|
|
|
||||||
| 3 |
Methods of investigating ransomware and cryptolockers |
2 | 2 | 7 | 11 |
|
|
|
||||||
| 4 |
Analysis of social engineering and psychological manipulation in cyberspace |
2 | 2 | 7 | 11 |
|
|
|
||||||
| 5 |
Techniques of covert operations and infiltration into cybercriminal groups |
2 | 2 | 7 | 11 |
|
|
|
||||||
| 6 |
Investigation of crimes in the darknet and anonymous networks |
2 | 2 | 7 | 11 |
|
|
|
||||||
| 7 |
Analysis of cryptocurrency transactions and digital asset laundering |
2 | 2 | 7 | 11 |
|
|
|
||||||
| 8 |
International cooperation in investigating transnational cybercrimes |
2 | 2 | 7 | 11 |
|
|
|
||||||
| 9 |
Cybercriminal profiling and modus operandi analysis |
2 | 2 | 7 | 11 |
|
|
|
||||||
| 10 |
Use of artificial intelligence in cybercrime investigations |
2 | 2 | 7 | 11 |
|
|
|
||||||
| Total | All Topics | 20 | 20 | 75 | 115 | - |