Content / Aims|
Deep web content cannot be indexed by search engine such as Google, Yahoo and Bing and darknet is lies within the deep web. Dark web has been intentionally hidden, and it is not accessible through standard browser. Deep web can be accessed by anyone who has The Onion Router (TOR) browser. TOR is a virtual and encrypted tunnel which allows people to hide their identity and network traffic and allow them to use internet anonymously. Dark web is virtually online market for anything, including but not limited to drugs, weapons, credit card data, forged documents, hire services for murder, narcotics and indecent pornography, etc. Because of these reasons, it is difficult for law enforcement agencies or digital forensic professionals to pinpoint the origin of traffic, location or ownership of any computer or person on the dark net. There has been lot of buzz around Bitcoin, TOR network and darknet, because most of the darknet sites carried out transactions through anonymous digital currency, peer to peer, distributed and Bitcoin which is based on cryptography principal (Cyberforensicator 2018).
The course aims at offering a clear overview of the Surface, Deep and Darknet world and the forensics tools available to carry an investigation.
This introductory course covers the following topics:
- A overview of the field of cyber security.
- An overall understanding and judgements of the implication of cyber- and computer laws, such as GDPR, and regulations (EU regulations) on data-driven cybercrime solutions and frameworks.
- Course participants will learn and judge concepts, and techniques and the application of attack and Defense Cyber Approaches. Typically they are grounded on risk management, and deploy security tech such as firewalls, VPNs, honey pots, trojan horse, … ;
- Attendees of the course will learn about the incident response and accountability aspect of cyber security. Emphasis will be placed on judgement, and practical applicability.
The course Data Forensics (JM2040), taught in spring semester, will be part of the minor Crime & Safety as of 2021-2022, together with the course Cybersecurity (JM2030), which will be taught in the fall semester.
In 2020-2021, JM2040 will already be offered as a stand-alone course (i.e elective course in year 2). The content of the course will be a mixture of JM2030 and JM2040. As a consequence, a student that takes JM2040 in 2020-2021 cannot take JM2030 in 2021-2022 anymore due to overlap.
The courses from the Data Science and Entrepreneurship program require specific prior knowledge. It is only possible to participate in this course if approved by the admission committee and if you are enrolled for the program. Please note that this course will be taught in Mariënburg, ‘s-Hertogenbosch (JADS). For more information, contact the Program Coordinator (via email@example.com)