Information Crime Investigation Management Course

Information Crime Investigation Management Course


Security Courses




    The importance of training courses is not only limited to professional life, as most of us think but training courses aim to transfer knowledge and practical experiences that enrich the skills of individuals and enhance their self-confidence, which contributes to the preparation of cadres which in turn contributes to the development and progress of institutions. Therefore, Strategic Vision Training Center aims to enhance the skills and experiences of individuals through the strongest training programs to keep pace with every development in the labor market.


  • Understand the legal aspects of IT crimes
  • Carrying out online investigations of crimes and people
  • Distinguish between the different types of digital and electronic evidence
  • Analyzing the informational content of social networking sites

Who should attend?

  • Police officers working in the field of criminal investigation and information analysis
  • Members of the Public Prosecution Office and judges
  • Information Security Officers
  • Lawyers
  • University faculty members
  • Security officials in institutions and companies

Course content:

1st Day

Legal controls to combat information technology crimes within the framework of international and regional agreements

  • Introducing cybercrime, its elements and legal nature
  • An analytical study of the different types of information crimes and the criminal methods of committing them
  • Analytical study of applications from practical reality in the methods of committing information crimes and methods of inference about the perpetrators

2nd Day

The use of artificial intelligence software in the management of the investigation of information Technology crimes

  • Explain the use of software for collecting and classifying information
  • Explanation of the use of image analysis program and monitoring of persons and criminal suspicion

3rd Day

Online electronic journals to prevent crime and detect criminal activities

  • • Technical assets and requirements for conducting security patrols
  • • Ways to find crime online
  • • Stealth and work under cover over the Internet to detect crimes and identify the perpetrators

4th Day

Introducing electronic and digital evidence and its legal argument

  • • What is digital evidence and the distinction between them and electronic evidence
  • • Technical search methods for manuals and software used

5nd Day

Social media content analysis

  • • What is the information content analysis of social networking sites?
  • • Steps to analyze the information content
  • • Classification and analysis of results