top of page

OakThorn Digital University
Anti-Cybercrime Initiative

Mission of the Anti-Cybercrime Initiative

To foster a culture of knowledge and awareness by educating on cyber-crime, high technology forensics, intelligence, security, and response. We will empower our students with the tools and skills to identify, mitigate, and respond to cyber threats while promoting a safe and secure digital environment all while working with other types of learning.

Coursework

Hardware, Storage, and Memory of a Computer or Device

Hardware refers to the physical components of a computer or device, such as the monitor, mouse, keyboard, and internal components such as the motherboard and processor. Storage is the device or medium used to store data, such as a hard drive or SSD. Memory is the internal storage used to temporarily store data and instructions for the processor to use.

Search and Seizure with Digital Forensics Imaging

Search and Seizure with Digital Forensics Imaging is the process of taking a digital image of a device such as a computer hard drive, external storage device, or mobile phone, for forensic analysis. This imaging process allows investigators to preserve the evidence in its original state, and to identify and analyze data that may be critical to an investigation.

Introduction to Programming and Logic

Introduction to Programming and Logic is a course that introduces the basics of programming and logic. It covers topics such as algorithms, flowcharts, and debugging, as well as introducing the different types of programming languages.

Surface, Deep, and Dark Web Operations

Surface Web Operations are activities conducted by individuals or organizations on the Internet that are publicly visible. Deep Web Operations are activities conducted on the Internet that are not visible to the public, such as databases, private websites, and member-only sites. Dark Web Operations are activities conducted on the Internet that are intentionally hidden, such as illegal activities or trading in illicit goods and services.

Computing, Data Manipulation, and File Structure

Computing is using hardware and software to carry out tasks such as data analysis, data manipulation, and file structure. Data manipulation is the process of organizing and changing data to get the desired result, while file structure is the way data is stored and organized.

Networking and Architecture

Networking is the process of connecting multiple computers and devices to each other and to the Internet so they can communicate and share resources. Architecture is the design of a network, which includes decisions about the hardware, software, protocols, and other components required to connect computers and devices.

​​​

Cyber Security and Ethical Hacking Basics

Cyber security is a set of techniques used to protect networks, systems, and programs from digital attacks. Ethical hacking is a process of attacking a computer system to determine its vulnerabilities in order to secure it from malicious attacks.

​​

Digital Currencies and Online Gaming Investigations


Digital Currencies and Online Gaming Investigations involve the tracking and analysis of digital currency transactions and online gaming activities to identify potential criminal activity or financial fraud. This includes the investigation of virtual currencies, such as Bitcoin, as well as the use of digital currencies in online gaming platforms.

Digital Forensics Methodology
 

Digital Forensics Methodology is the practice of using scientific methods, processes, and tools to identify, collect, analyze, and preserve digital evidence. It is a structured approach to investigate digital assets to investigate and uncover evidence related to cyber-crime or other digital activities.

Advanced Digital Forensics Methodology

Advanced Digital Forensics Methodology is a process that uses sophisticated techniques to investigate and analyze digital evidence. This method of analysis involves extracting, preserving, and analyzing digital data.  This method also includes the use of specialized tools and techniques to identify and analyze suspicious activity. The goal of this process is to reconstruct events that occurred on a digital device.

Cybercrime and Criminal Investigations

Cybercrime is any illegal activity that involves computers, networks, or digital devices. Criminal investigations involve gathering evidence and information to identify, investigate, and prosecute individuals who are suspected of breaking the law.

​​​​​

Enrollment into the Anti-Cybercrime Initiative

The coursework will come in self-guided modules, monthly webinars, written material, and hands on dark range technology. All this includes a written guide "Investigating 1s and 0s", discounts on further classes or programs, free webinars, and access to various range programs to interact and practice the craft in cyber-crime investigations and enforcement.

Price of Enrollment: $249.99 (11 Classes)

FREE Copy of Investigating 1s and 0s EBook When Its Ready!

Discounts on Additional Coursework

Free Access to Dark Ranges and Tools

Free Webinars Monthly and MUCH MORE!

EVERY COURSE IS STACKING UP! Click Below to Enroll!

Representing an Institution or Agency?
bottom of page