Cyber Investigator Training
Published 5/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 638.18 MB | Duration: 1h 2m
Published 5/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 638.18 MB | Duration: 1h 2m
Complete Cyber Investigations Course
What you'll learn
Fundamentals of Conducting a Cyber-Investigation
Locating Suspects by their IP Addresses
Email Crimes (spoofing, scams, threats, etc.)
Phone Spoofing
Understanding the Dark Web
Requirements
Designed for investigators, you will not find clunky acronyms or confusing jargon here. Rather, we focus on the fundamentals that exist at the core of every cyber-investigation.
Description
This course is designed to provide students of all experience levels with comprehensive knowledge and foundational investigative skills related to Cyber-investigations. While technical concepts are discussed, we have stripped away all clunky acronymous and industry jargon in order to focus only on the aspects that are relevant to investigators to provide them with the knowledge the need to do their jobs effectively. At the con confusion of this course, you will be prepared to investigate the vast majority of cyber cases that you are likely to encounter in the real world. This is achieved by focusing on the fundamentals that exist at the core of cyber investigations. This course is designed and taught by an industry professional, who has worked many varieties of cyber cases. Regardless of your particular field (bank fraud, child exploitation, narcotics, etc.), this training will provide you with the information you need to be an effective cyber professional!We will cover concepts such as:• Fundamentals of Conducting a Cyber-Investigation• Investigating mobile transfers (Venmo, Zelle, etc.)• Social Media Threat Investigations• Understanding the Dark Web• Cryptocurrency (Bitcoin, etc.)• Phone Spoofing• How Digital Devices Communicate via the Internet• Locating Suspects by their IP Addresses• Hiding on the Internet (Virtual Private Networks (VPNs), Proxy Servers, etc.)• Investigating Internet-based Phone Services (VoIP)• E-mail Crimes (spoofing, scams, threats, etc.)
Overview
Section 1: Introduction
Lecture 1 Introduction
Section 2: Chapter 1
Lecture 2 Let's Connect
Section 3: Chapter 2
Lecture 3 Hiding in Plain Sight
Section 4: Chapter 3
Lecture 4 Let's Find the Source
Section 5: Chapter 4
Lecture 5 Behind the Curtain
Section 6: Chapter 5
Lecture 6 Details, Detail, Details…
Section 7: Chapter 6
Lecture 7 From A to Z
Section 8: Congratulations!
Lecture 8 Thank you for attending!
Investigators / Detectives,Law Enforcement Officers,Financial / Bank Investigators