• Courses

    Latest Courses

    • Investigating Cryptocurrency Transactions – Course no. 9
    • Investigating Cryptocurrency Transactions – Course no. 8
    • Investigating Cryptocurrency Transactions – Course no. 7
    • Investigating Cryptocurrency Transactions – Course no. 6
    • Investigating Cryptocurrency Transactions – Course no. 5
    • Investigating Cryptocurrency Transactions – Course no. 4
    • Investigating Cryptocurrency Transactions – Course no. 3
    • Investigating Cryptocurrency Transactions – Course no. 2
    Investigating Cryptocurrency Transactions – Course no. 9

    Investigating Cryptocurrency Transactions – Course no. 9

    Free
    Read More
  • Trainers
  • Events
  • Guidelines
    • Cybersecurity Skills
    • Cybersecurity Guide
    • Cybersecurity Best Practices
    • OSINT for Fake News
  • About us
  • Contact
    CyberLearning
    • Courses

      Latest Courses

      • Investigating Cryptocurrency Transactions – Course no. 9
      • Investigating Cryptocurrency Transactions – Course no. 8
      • Investigating Cryptocurrency Transactions – Course no. 7
      • Investigating Cryptocurrency Transactions – Course no. 6
      • Investigating Cryptocurrency Transactions – Course no. 5
      • Investigating Cryptocurrency Transactions – Course no. 4
      • Investigating Cryptocurrency Transactions – Course no. 3
      • Investigating Cryptocurrency Transactions – Course no. 2
      Investigating Cryptocurrency Transactions – Course no. 9

      Investigating Cryptocurrency Transactions – Course no. 9

      Free
      Read More
    • Trainers
    • Events
    • Guidelines
      • Cybersecurity Skills
      • Cybersecurity Guide
      • Cybersecurity Best Practices
      • OSINT for Fake News
    • About us
    • Contact

      Cybercrime

      • Home
      • All courses
      • Cybercrime
      • Investigative techniques for cyber-attacks
      CoursesCybercrimeInvestigative techniques for cyber-attacks
      • Interactive presentations
        6
        • Lecture1.1
          The evolution of cyber-attacks
        • Lecture1.2
          Cooperation in case of cyber-attacks
        • Lecture1.3
          Cyber-attacks investigation (web-based, email-based attacks)
        • Lecture1.4
          Malware classification
        • Lecture1.5
          Attacks on banking systems
        • Lecture1.6
          Cybersecurity companies overview on cyber-attacks investigation investigation
      • Post presentations session
        3
        • Lecture2.1
          Study cases
        • Lecture2.2
          Questions & Answers
        • Lecture2.3
          Final conclusions

        Final conclusions

        Lesson content is empty.
        Prev Questions & Answers

        Leave A Reply Cancel reply

        You must be logged in to post a comment.

        Latest Courses

        Investigating Cryptocurrency Transactions – Course no. 9

        Investigating Cryptocurrency Transactions – Course no. 9

        Free
        Investigating Cryptocurrency Transactions – Course no. 8

        Investigating Cryptocurrency Transactions – Course no. 8

        Free
        Investigating Cryptocurrency Transactions – Course no. 7

        Investigating Cryptocurrency Transactions – Course no. 7

        Free
        Investigating Cryptocurrency Transactions – Course no. 6

        Investigating Cryptocurrency Transactions – Course no. 6

        Free
        Investigating Cryptocurrency Transactions – Course no. 5

        Investigating Cryptocurrency Transactions – Course no. 5

        Free

        Latest Posts

        Launching the course on online money laundering
        28Jan2022
        Launching the course on analyzing cryptocurrencies
        28Jan2022
        Launching the course on investigating malware attacks
        24Jan2022
        Launching the course on collecting electronic evidence
        24Jan2022
        Launching the course on latest threats in social networks
        12Jan2022

        Contact

        www.raisa.org

        contact[at]raisa[dot]org

        Follow us on

        Latest Courses

        Investigating Cryptocurrency Transactions – Course no. 9 Read More
        Admin bar avatar
        Admin

        Investigating Cryptocurrency Transactions – Course no. 9

        Admin bar avatar
        Admin
        15
        students
        Free
        Investigating Cryptocurrency Transactions – Course no. 8 Read More
        Admin bar avatar
        Admin

        Investigating Cryptocurrency Transactions – Course no. 8

        Admin bar avatar
        Admin
        15
        students
        Free
        Investigating Cryptocurrency Transactions – Course no. 7 Read More
        Admin bar avatar
        Admin

        Investigating Cryptocurrency Transactions – Course no. 7

        Admin bar avatar
        Admin
        17
        students
        Free
        Investigating Cryptocurrency Transactions – Course no. 6 Read More
        Admin bar avatar
        Admin

        Investigating Cryptocurrency Transactions – Course no. 6

        Admin bar avatar
        Admin
        15
        students
        Free
        Investigating Cryptocurrency Transactions – Course no. 5 Read More
        Admin bar avatar
        Admin

        Investigating Cryptocurrency Transactions – Course no. 5

        Admin bar avatar
        Admin
        14
        students
        Free
        Investigating Cryptocurrency Transactions – Course no. 4 Read More
        Admin bar avatar
        Admin

        Investigating Cryptocurrency Transactions – Course no. 4

        Admin bar avatar
        Admin
        25
        students
        Free
        Investigating Cryptocurrency Transactions – Course no. 3 Read More
        Admin bar avatar
        Admin

        Investigating Cryptocurrency Transactions – Course no. 3

        Admin bar avatar
        Admin
        26
        students
        Free
        Investigating Cryptocurrency Transactions – Course no. 2 Read More
        Admin bar avatar
        Admin

        Investigating Cryptocurrency Transactions – Course no. 2

        Admin bar avatar
        Admin
        23
        students
        Free

        This website was developed by the Romanian Association for Information Security Assurance (RAISA) with the help of the U.S. Embassy in Romania within the “Enhance Cyber Capacity Building in Romania for Preventing and Combating the Cybercrime Phenomenon” project. The project was funded in part by a grant from the United States Department of State. The opinions, findings, and conclusions stated herein are those of the author[s] and do not necessarily reflect those of the United States Department of State.

        Modal title

        Message modal