OakThorn Digital University
Anti-Cybercrime Initiative
All Courses Set To Finish Q3 2023
Mission of the Anti-Cybercrime Initiative
To foster a culture of knowledge and awareness by educating on cyber-crime, high technology forensics, intelligence, security, and response. We will empower our students with the tools and skills to identify, mitigate, and respond to cyber threats while promoting a safe and secure digital environment all while working with other types of learning.
Coursework
Hardware, Storage, and Memory of a Computer or Device (Finished)
Hardware refers to the physical components of a computer or device, such as the monitor, mouse, keyboard, and internal components such as the motherboard and processor. Storage is the device or medium used to store data, such as a hard drive or SSD. Memory is the internal storage used to temporarily store data and instructions for the processor to use.
Search and Seizure with Digital Forensics Imaging
Search and Seizure with Digital Forensics Imaging is the process of taking a digital image of a device such as a computer hard drive, external storage device, or mobile phone, for forensic analysis. This imaging process allows investigators to preserve the evidence in its original state, and to identify and analyze data that may be critical to an investigation.
Introduction to Programming and Logic
Introduction to Programming and Logic is a course that introduces the basics of programming and logic. It covers topics such as algorithms, flowcharts, and debugging, as well as introducing the different types of programming languages.
Surface, Deep, and Dark Web Operations
Surface Web Operations are activities conducted by individuals or organizations on the Internet that are publicly visible. Deep Web Operations are activities conducted on the Internet that are not visible to the public, such as databases, private websites, and member-only sites. Dark Web Operations are activities conducted on the Internet that are intentionally hidden, such as illegal activities or trading in illicit goods and services.
Computing, Data Manipulation, and File Structure (In Development)
Computing is using hardware and software to carry out tasks such as data analysis, data manipulation, and file structure. Data manipulation is the process of organizing and changing data to get the desired result, while file structure is the way data is stored and organized.
Networking and Architecture
Networking is the process of connecting multiple computers and devices to each other and to the Internet so they can communicate and share resources. Architecture is the design of a network, which includes decisions about the hardware, software, protocols, and other components required to connect computers and devices.
Cyber Security and Ethical Hacking Basics
Cyber security is a set of techniques used to protect networks, systems, and programs from digital attacks. Ethical hacking is a process of attacking a computer system to determine its vulnerabilities in order to secure it from malicious attacks.
Digital Currencies and Online Gaming Investigations
Digital Currencies and Online Gaming Investigations involve the tracking and analysis of digital currency transactions and online gaming activities to identify potential criminal activity or financial fraud. This includes the investigation of virtual currencies, such as Bitcoin, as well as the use of digital currencies in online gaming platforms.
Digital Forensics Methodology
Digital Forensics Methodology is the practice of using scientific methods, processes, and tools to identify, collect, analyze, and preserve digital evidence. It is a structured approach to investigate digital assets to investigate and uncover evidence related to cyber-crime or other digital activities.
Advanced Digital Forensics Methodology
Advanced Digital Forensics Methodology is a process that uses sophisticated techniques to investigate and analyze digital evidence. This method of analysis involves extracting, preserving, and analyzing digital data. This method also includes the use of specialized tools and techniques to identify and analyze suspicious activity. The goal of this process is to reconstruct events that occurred on a digital device.
Cybercrime and Criminal Investigations
Cybercrime is any illegal activity that involves computers, networks, or digital devices. Criminal investigations involve gathering evidence and information to identify, investigate, and prosecute individuals who are suspected of breaking the law.
Enrollment into the Anti-Cybercrime Initiative
The coursework will come in self-guided modules, monthly webinars, written material, and hands on dark range technology. All this includes a written guide "Investigating 1s and 0s", discounts on further classes or programs, free webinars, and access to various range programs to interact and practice the craft in cyber-crime investigations and enforcement.
Price of Enrollment: $249.99 (11 Classes)
FREE Copy of Investigating 1s and 0s EBook When Its Ready!
Discounts on Additional Coursework
Free Access to Dark Ranges and Tools
Free Webinars Monthly and MUCH MORE!
Courses Are Being Added As They Are Finished.