Course curriculum

  • 1

    Introduction to Counter-Intelligence Threat

    • Welcome to the Cyber Counterintelligence Threat Analysis Program!
    • Group Forum Discussion: Introduce Yourself!
    • Group Forum Discussion
    • Code of Ethics (Reading Assignment)
    • Resources
  • 2

    Intelligence Overview

    • Types of Cyber Crime (Reading Assignment)
    • Intro to Cyber Investigations - Overview
    • How Cyber Criminals Attack
    • Conducting Cyber Investigations
    • Cyber Investigations 101
    • How to Investigate Email Headers
    • Conclusion & Recap
    • Intro to Cyber Investigations Conclusion
  • 3

    Applying Intelligence Methodologies

    • Intelligence Methodologies
    • Group Forum Discussion
  • 4

    Cyber Terrorism & Hackers

    • Cyber Terrorism in the News
    • Counter Terrorism
  • 5

    Cyber Threats & Concerns

    • Cyber Threat Concerns
  • 6

    Email Headers and Digital Forensics

    • Cyber Forensics (Reading Assignment)
    • Investigating Email Crimes: The Who, What, When, and Where!
    • What do we do with our findings?
    • Email Header Information
    • Mobile Forensics Part 1
    • Mobile Forensics Part 2
    • Quiz: Digital and Mobile Forensics
  • 7

    Setting up an investigators computer

    • Setting up an investigators computer (Reading Assignment)
    • Quiz: Setting up the Investigators Computer
  • 8

    Understanding The Perpetrator

    • Understanding the Perpetrator (Reading Assignment)
    • Quiz: Understanding the Perpetrator
  • 9

    Understanding Deception

    • Understanding Deception (Reading Assignment)
    • Quiz: Deception
  • 10

    Basic Social Media Investigations

    • Basic Social Media Intro
    • Facebook Search
    • Locating People on Facebook
    • Facebook Profile
    • Facebook Search Tool
    • Facebook Private Profile Information
    • Twitter
    • Twitter Search
    • Twitter Mobile App
    • YouTube
    • YouTube Search
    • Google+
    • Google+ Search
    • Ethical Considerations
    • Quiz: Basic Social Media Investigations
  • 11

    Advanced Social Media Investigations

    • Resources
    • An overview of Advanced Social Media Investigations
    • Defining Open Source Intelligence
    • A World of Sock Puppets
    • Domain Names
    • Username Workflow
    • Search Engines
    • Facebook
    • Twitter
    • Instagram
    • YouTube
    • Hootsuite and SproutSocial
    • Quiz: Advanced Social Media Investigations
  • 12

    Chatting Up Your Person of Interest

    • Introduction to Video Chat Platforms
    • Skype Sign Up
    • Web Platform and Features
    • Skype App and Searching
    • Google Hangouts Intro
    • Google Plus
    • Hangouts Tutorial
    • Google Hangouts Mobile
    • Oovoo
    • Oovoo Chat Window
    • Facetime
    • Tango
    • Quiz: Chatting Up Your Person of Interest
  • 13

    What Do We Do With Dating Sites

    • Dating Site Introduction
    • Doing a Basic Search on Plenty of Fish
    • Plenty of Fish Advanced Search
    • Searching for a Username on Plenty of Fish
    • Searching the Forums in Plenty of Fish
    • Match.com Login and Overview
    • Match.com Search Functions
    • What about Google Site Search
    • Quiz: Dating Sites
  • 14

    Classified Investigation Methodologies

    • Classified Investigations - Introduction
    • Where is eCrime Most Prevalent
    • Fencing Vs. eFencing
    • eCommerce Challenges to Investigating Fraudsters
    • Prosecution Challenges
    • Prosecution Requirements
    • Science Meets eCrime
    • Craigslist Overview
    • Craigslist Listings
    • Craigslist Investigations
    • Google Boolean Searches (Site Search)
    • Quiz: Classified Investigations Quiz
  • 15

    Documenting Social Media Evidence

    • Documenting Social Media Evidence (Reading Assignment)
    • Quiz: Documenting Social Media Evidence
  • 16

    eCrime Investigation Methodologies

    • eCrime Investigations - Introduction
    • Where is eCrime Most Prevalent
    • Fencing Vs. eFencing
    • eCommerce Challenges to Investigating Fraudsters
    • Prosecution Challenges
    • Prosecution Requirements
    • Science Meets eCrime
    • Ebay The World's Largest Auction Platform
    • Boosters Selling on Ebay
    • Ebay Fraudsters - Let's Find Them
    • Ebay Listing Overview
    • Advanced Search Overview
    • Search Results Overview
    • Auction Listing Details
    • Feedback Profile Overview
    • Auction Analysis for Fraud
    • Feedback Systems and How Fraudsters Use Them
    • Ebay Feedback Review - First 30 Days
    • Craigslist Overview
    • Craigslist Listings
    • Craigslist Investigations
    • Google Boolean Searches - Site Search
    • Group Forum Discussion: eBay Investigation
    • Group Forum Discussion: Craigslist Investigation
    • Quiz: eCrime Investigations Quiz
  • 17

    Advanced eCrime Investigation Methodologies

    • Introduction to Advanced eCommerce Fraud
    • The Demographics of Online Fraudsters
    • Trends and Patterns of Online Fraudsters
    • The Profile of an Online Fraudster
    • Types of Auction Fraud
    • Patterns in Fraudulent Behavior
    • Research Results and Types of Auction Fraud
    • Analyze Fraudulent Behavior
    • eBay Investigations
    • eBay Auction Search Kit
    • eBay and Terapeak
    • Hot Topic Research on Terapeak
    • eBay Investigative Tips
    • Craigslist Investigation
    • Craigslist Investigation Tips
    • Facebook Marketplace (Oodle) Introduction
    • Facebook Marketplace - Searching Individuals
    • Facebook Marketplace Investigative Tips
    • Google Advanced Operators
    • Google Site Search: eforcity
    • Google Site Search
    • Email Header Information
    • Meta Data
    • eCommerce Laboratory
    • Conclusion
    • Quiz: Advanced eCrime Investigation Methodologies
  • 18

    Exploring the Deep Web

    • The Deep Web!
    • What the @#$% is a Bitcoin anyway?
    • Getting Started with TOR (Step by Step)
    • Introducing the TOR Project
    • The Secrets Behind the TOR Browser
    • Tor Wiki (Resource)
    • The Deep Web (Overview)
    • Exploration of the Deep Web
    • Quiz: Deep Web
  • 19

    Open Source Intelligence

    • Open Source Intelligence (Reading Assignment)
    • Open Source Intelligence Gathering Methodologies (OSINT)
    • Quiz: Open Source Intelligence
  • 20

    Law Enforcement Efforts

    • Law Enforcement Efforts (Reading Assignment)
    • Quiz: Law Enforcement Efforts
  • 21

    Advanced Searching

    • Advanced Searching (Reading Assignment)
    • Quiz: Advanced Searching
  • 22

    Counter-Intelligence Threat Analyst MicroDegree Exam

    • Exam Application
    • Final Exam: MicroDegree