Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Cyber Investigator Training

Posted By: ELK1nG
Cyber Investigator Training

Cyber Investigator Training
Published 5/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 638.18 MB | Duration: 1h 2m

Complete Cyber Investigations Course

What you'll learn

Fundamentals of Conducting a Cyber-Investigation

Locating Suspects by their IP Addresses

Email Crimes (spoofing, scams, threats, etc.)

Phone Spoofing

Understanding the Dark Web

Requirements

Designed for investigators, you will not find clunky acronyms or confusing jargon here. Rather, we focus on the fundamentals that exist at the core of every cyber-investigation.

Description

This course is designed to provide students of all experience levels with comprehensive knowledge and foundational investigative skills related to Cyber-investigations. While technical concepts are discussed, we have stripped away all clunky acronymous and industry jargon in order to focus only on the aspects that are relevant to investigators to provide them with the knowledge the need to do their jobs effectively. At the con confusion of this course, you will be prepared to investigate the vast majority of cyber cases that you are likely to encounter in the real world. This is achieved by focusing on the  fundamentals that exist at the core of cyber investigations. This course is designed and taught by an industry professional, who has worked many varieties of cyber cases. Regardless of your particular field (bank fraud, child exploitation, narcotics, etc.), this training will provide you with the information you need to be an effective cyber professional!We will cover concepts such as:• Fundamentals of Conducting a Cyber-Investigation• Investigating mobile transfers (Venmo, Zelle, etc.)• Social Media Threat Investigations• Understanding the Dark Web• Cryptocurrency (Bitcoin, etc.)• Phone Spoofing• How Digital Devices Communicate via the Internet• Locating Suspects by their IP Addresses• Hiding on the Internet (Virtual Private Networks (VPNs), Proxy Servers, etc.)• Investigating Internet-based Phone Services (VoIP)• E-mail Crimes (spoofing, scams, threats, etc.)

Overview

Section 1: Introduction

Lecture 1 Introduction

Section 2: Chapter 1

Lecture 2 Let's Connect

Section 3: Chapter 2

Lecture 3 Hiding in Plain Sight

Section 4: Chapter 3

Lecture 4 Let's Find the Source

Section 5: Chapter 4

Lecture 5 Behind the Curtain

Section 6: Chapter 5

Lecture 6 Details, Detail, Details…

Section 7: Chapter 6

Lecture 7 From A to Z

Section 8: Congratulations!

Lecture 8 Thank you for attending!

Investigators / Detectives,Law Enforcement Officers,Financial / Bank Investigators