OUR FORENSICS AND CYBER TRAINING COURSES

Forensics and Cyber Training

  • Forensic Accounting and Fraud Investigation
  • Detection and Prevention of Fraud
  • Computer forensics
  • Legal Components in a Forensic Investigation
  • Cyber Security
  • Ethical Hacker
  • Interviewing and Presentation Evidence

Forensic Accounting Investigation (Hands-on Practical Training) using Forensic Intelligence Analyst Software

This is to develop the specialist accounting skills and knowledge needed to start a career in forensic accounting investigation. In work places, a forensic approach to accounting is often used. This course gives you a quick start in the forensic Accounting field.

https://fci-limited.co.uk/wp-content/uploads/2021/05/cyber-security-3400657_1920-600x400.jpg

Please browse through our training programs below:

https://fci-limited.co.uk/wp-content/uploads/2021/05/tech-3041437_1920-600x400.jpg

Fighting Fraud

  • Fraud Investigation Technique
  • Fraud Risk Assessment
  • Internal Controls for Fraud Prevention
  • Bribery And Corruption Act
  • Legal elements of Bribery and Corruption
  • Identifying common corruption schemes
  • Respond to red flags of Corruption.
  • Money Laundering Act
  • Legal Element of Money Laundering
  • Measures necessary for combating money laundering
  • Investigation for Money Laundering

Electronic Crime

  • Electronic Crime Principles
  • Name of Viruses
  • Identity Fraud

Law of Evidence

  • Gathering Evidence
  • Data Protection Act.
  • Cybercrime Prevention training covers the following:
  • Hacking
  • Phishing
  • Denial of service attacks
  • Unauthorised data access.

Finger Print Training

Presentation to Fingerprints, Description and Promotion of Fingerprints, Categorisation of Fingerprints, Henry method of fingerprint categorisation, Classifying various fingerprint forms, distinguishing persons from fingerprint shapes. Thrilling fingerprints from various objects, Types of Fingerprints and Class & Individual Characteristics, Different methods of latent fingerprint development Photography of fingerprints, Comparison / Verification of fingerprints, Automatic fingerprint identification system, Fingerprint expert in court, Expert Opinion Writing

Attacks can be targeted at servers, websites, computers, mobile devices and tablets and as well as information stored in the cloud.