Course curriculum

  • 1

    Welcome to the Certified Cyber Investigations and Intelligence MicroDegree!

    • Welcome to the MicroDegree
    • Group Forum Discussion: Introduce Yourself!
    • Introduction (Reading Assignment)
    • Code of Ethics (Reading Assignment)
    • Course Materials / Downloads
  • 2

    History and Background

    • Manual_History_Background_Ch1
    • Module 2 Quiz: History and Background
  • 3

    Cyber Intelligence (Overview)

    • Cyber Intelligence (Reading Assignment)
    • Module 3 Quiz: Cyber Intelligence
  • 4

    eCrime Investigation Methodologies

    • eCommerce Investigation Methodologies (Reading Assignment)
    • eCrime Investigations - Introduction
    • Where is eCrime Most Prevalent
    • Fencing Vs. eFencing
    • eCommerce Challenges to Investigating Fraudsters
    • Prosecution Challenges
    • Prosecution Requirements
    • Science Meets eCrime
    • Ebay The World's Largest Auction Platform
    • Ebay Fraudsters - Let's Find Them
    • Boosters Selling on Ebay
    • Ebay Listing Overview
    • Advanced eBay Search Overview
    • eBay Search Results Overview
    • Auction Listing Details
    • Feedback Profile Overview
    • Auction Analysis for Fraud
    • Feedback Systems and How Fraudsters Use Them
    • eBay Feedback Review - First 30 Days
    • Craigslist Overview
    • Craigslist Listings
    • Craigslist Investigations
    • Google Boolean Searches - Site Search
    • Group Forum Discussion: eBay Investigation
    • Group Forum Discussion: Craigslist Investigation
    • Module 4 Quiz: eCrime Investigations Quiz
  • 5

    Advanced eCrime Investigation Methodologies

    • Introduction to Advanced eCommerce Fraud
    • The Demographics of Online Fraudsters
    • Trends and Patterns of Online Fraudsters
    • The Profile of an Online Fraudster
    • Types of Auction Fraud
    • Patterns in Fraudulent Behavior
    • Research Results and Types of Auction Fraud
    • Analyze Fraudulent Behavior
    • eBay Investigations
    • eBay Auction Search Kit
    • eBay and Terapeak
    • Hot Topic Research on Terapeak
    • eBay Investigative Tips
    • Craigslist Investigations
    • Craigslist Investigation Tips
    • Facebook Marketplace (Oodle) Introduction
    • Facebook Marketplace - Searching Individuals
    • Facebook Marketplace Investigative Tips
    • Google Advanced Operators
    • Google Site Search: eforcity
    • Google Site Search
    • Email Header Information
    • Meta Data
    • eCommerce Laboratory
    • Advanced eCrime Investigation Conclusion
    • Module 5 Quiz: Advanced eCrime Investigation Methodologies
  • 6

    Classified Investigation Methodologies

    • Classified Investigations - Introduction
    • Where is eCrime Most Prevalent
    • Fencing Vs. eFencing
    • eCommerce Challenges to Investigating Fraudsters
    • Prosecution Challenges
    • Science Meets eCrime
    • Craigslist Overview
    • Craigslist LIstings
    • Craigslist Investigations
    • Google Boolean Searches (Site Search)
    • Module 6 Quiz: Classified Investigations Quiz
  • 7

    Introduction to Cyber Investigations

    • Types of Cyber Crime (Reading Assignment)
    • Intro to Cyber Investigations - Overview
    • How Cyber Criminals Attack
    • Conducting Cyber Investigations
    • Cyber Investigations 101
    • How to Investigate Email Headers
    • Conclusion & Recap
    • Module 7 Quiz: Introduction to Cyber Investigations
  • 8

    Exploring the Deep Web

    • The Deep Web!
    • What the @#$% is a Bitcoin anyway?
    • Getting Started with TOR (Step by Step)
    • Introducing the TOR Project
    • The Secrets Behind the TOR Browser
    • TOR Wiki (Resource)
    • The Deep Web (Overview)
    • Exploration of the Deep Web
    • Module 8 Quiz: Deep Web
  • 9

    Interpretation of Behaviors

    • Interpretation of Behaviors (Reading Assignment)
    • Module 9 Quiz: Interpretation of Behaviors
  • 10

    Cyber Investigations 101

    • Cyber Investigations (Reading Assignment)
    • Module 10 Quiz: Cyber Investigations 101
  • 11

    Understanding the Perpetrator

    • Understanding the Perpetrator (Reading Assignment)
    • Module 11 Quiz: Understanding the Perpetrator
  • 12

    Email Headers and Digital Forensics

    • Cyber Forensics (Reading Assignment)
    • Investigating Email Crimes: The Who, What, When, and Where!
    • What do we do?
    • Email Header Information
    • Mobile Forensics Part 1
    • Mobile Forensics Part 2
    • Module 12 Quiz: Digital and Mobile Forensics
  • 13

    Open Source Intelligence

    • Open Source Intelligence (Reading Assignment)
    • Module 13 Quiz: Open Source Intelligence
  • 14

    Privacy

    • Privacy (Reading Assignment)
    • Module 14 Quiz: Privacy
  • 15

    Advanced Social Media Investigations

    • Resources
    • An overview of Advanced Social Media Investigations
    • Defining Open Source Intelligence
    • A World of Sock Puppets
    • Domain Names
    • Username Workflow
    • Search Engines
    • Facebook
    • Twitter
    • Instagram
    • YouTube
    • Hootsuite and SproutSocial
    • Module 16 Quiz: Advanced Social Media Investigations
  • 16

    Legal Fundamentals of Cyber Investigations

    • Legal Fundamentals (Reading Assignment)
    • Introduction to Legal Fundamentals
    • Understanding Your Role as a Corporate Investigator
    • Understanding Your Employees Rights
    • The Electronic Communications Privacy Act
    • Understanding Law Enforcement Concerns
    • An Agent of the Law
    • Federal Laws to Prosecute CyberCrimes
    • Becoming an Expert Witness
    • Dauberts Standards, What is it?
    • Common Task of an Expert Witness
    • Preparing to Become an Expert Witness
    • Your Role as a Consultant
    • How to Prepare Your Testimony for Court
    • Preparing Forensic and Computer Evidence
    • Legal Fundamentals of Cyber Investigations Summary
    • Module 17 Quiz: Legal Fundamentals of Cyber Investigations
  • 17

    Documenting Social Media Evidence

    • Documenting Social Media Evidence (Reading Assignment)
    • Module 18 Quiz: Documenting Social Media Evidence
  • 18

    Chatting Up Your Person of Interest

    • Introduction to Video Chat Platforms
    • Skype Sign Up
    • Web Platform and Features
    • Skype App and Searching
    • Google Hangouts Intro
    • Google Plus
    • Hangouts Tutorial
    • Google Hangouts Mobile
    • Oovoo
    • Oovoo Chat Window
    • Facetime
    • Tango
    • Module 19 Quiz: Chatting Up Your Person of Interest
  • 19

    What Do We Do With Dating Sites

    • Dating Site Introduction
    • Doing a Basic Search on Plenty of Fish
    • Plenty of Fish Advanced Search
    • Searching for a Username on Plenty of Fish
    • Searching the Forums in Plenty of Fish
    • Match.com Login and Overview
    • Match.com Search Functions
    • What about Google Site Search
    • Module 20 Quiz: Dating Sites
  • 20

    How to Utilize Informants

    • Introduction to Informants
    • Informants Pt. 2: Suitability
    • Informants Pt. 3: Trust and Confidentiality
    • Informants Pt. 4: Safe Handling of Informants
    • Informants Pt 5: Legal Liabilities
    • Module 21 Quiz: Informants
  • 21

    Law Enforcement Efforts

    • Law Enforcement Efforts (Reading Assignment)
    • Module 22 Quiz: Law Enforcement Efforts
  • 22

    Digital Evidence

    • Social Media Evidence (Reading Assignment)
    • Module 23 Quiz: Digital Evidence
  • 23

    Setting up an investigators computer

    • Setting up an investigators computer (Reading Assignment)
    • Module 24 Quiz: Setting up the Investigators Computer
  • 24

    Ethical Considerations

    • Ethical Considerations (Reading Assignment)
    • Module 25 Quiz: Ethical Considerations
  • 25

    Advanced Searching

    • Advanced Searching (Reading Assignment)
    • Module 26 Quiz: Advance Searching
  • 26

    Deception

    • Understanding Deception (Reading Assignment)
    • Module 27 Quiz: Deception
  • 27

    Program Design and Development

    • Program Design and Development (Reading Assignment)
    • Module 28 Quiz: Program Development
  • 28

    Introduction to ORC Investigations

    • Welcome to Organized Retail Crime
    • Introduction to ORC (Reading Assignment)
    • How we Create Influential Leaders!
    • What is the Journey Going to be Like?
    • Are You a Super Guru in the Making?
  • 29

    Organized Retail Crime Overview

    • ORC Overview (Reading Assignment)
    • What is the Definition of ORC?
    • What is Our Idea of ORC?
    • ORC: How Do They Do It?
    • Module 30 Quiz: ORC Overview
  • 30

    Organized Retail Crime Fraud Schemes

    • ORC Fraud Schemes (Reading Assignment)
    • What Industries Does ORC Impact?
    • What are The Top Cities and Products for ORC?
    • Module 31 Quiz: ORC Fraud Schemes
  • 31

    Booster Operations

    • Booster Operations (Reading Assignment)
    • What Is a Booster and What Do They Do?
    • What Tools Does a Booster Use?
    • What are The Different Levels of a Booster?
    • Module 32 Quiz: Booster Operations
  • 32

    Fencing Operations

    • Fencing Operations (Reading Assignments)
    • What is a Fence?
    • How Do We Stop ORC?
    • The Struggles: Don't Give Up!
    • Module 33 Quiz: Fencing Operations
  • 33

    Organized Retail Crime Investigations

    • Introduction to ORC Investigations
    • What will we learn today?
    • How to Investigate Organized Retail Crime
    • How to Educate and Train...
    • What Kind of Visual Deterrents to Use to Stop ORC!
    • What Kind of Physical Deterrents Can You Use to Stop ORC!
    • How to Decide Correct Camera Placement!
    • What to Know about Merchandise Tagging!
    • Make Sure You Know the Reporting Methods!
    • How Are You Doing the Investigation?
    • The ORC Theory and Research Facts!
    • Look at Your Options!
    • Can You Identify an Investigation Route?
    • Know the Case Enhancement!
    • What is Needed for the Investigation
    • How is Shoplifting Successful and How We Stop It?
    • How to Investigate Check Fraud?
    • Is Your Credit Card Safe?
    • Investigating Gift Card Deception!
    • Is That a Legitimate Refund? ?
    • Did You Make Your Coupon?
    • Walking Through a Practical Investigation!
  • 34

    Organized Retail Crime Investigations Part 2

    • Are You Articulating Your Documentation?
    • Do You Have Evidence of a Fence?
    • What about Overseas Sales?
    • Introduction and What You Will Learn!
    • Taking Down the Crew!
    • Do You Have the Correct Information?
    • Taking the Right Photographs
    • Interview and Interrogation (Reading Assignment)
    • Completing the Interview and Interrogation
    • Make Sure You Obtain a Written Statement!
    • How do They Establish a Fencing Operation?
    • What are the Different Levels of a Fence?
    • What do Fence Locations Look Like?
    • What is E-fencing?
    • Using Surveillance to Track Your Suspect!
    • Use Cellphone Records to Tie Your Suspect to the Case
    • Do You Use Merchandise Tracking?
    • Do You Know How to Develop Your Informant?
    • Conducting Buys and Sales!
    • Investigation of a Fence!
    • Types of Gateway Crimes?
    • Here is a Practical Exercise!
    • Here are the Subpoenas and Search and Seizures!
  • 35

    Surviellance Methods

    • Surveillance Methods (Preliminary)
    • Mobile Surveillance & Prep
  • 36

    Legal Fundamentals of Organized Retail Crime

    • ORC Legal Aspects (Reading Assignment)
    • Intro to Legal Fundamentals of Organized Retail Crime and What You Will Learn!
    • What Types of Crimes Occur?
    • What are the Different Types of Courts?
    • What Bills and Acts Help Fight ORC?
    • Prosecuting the Criminal!
    • What about Court Orders?
    • Computer Forensic Types of Evidence!
    • Collecting Photographic Evidence for Your Case!
    • What Evidence do You Have of a Fence?
    • What is the Charging Process?
    • Learn How to be an Expert Witness!
    • How to Prepare for the Verdict!
    • Make Sure You Review Your Case!
    • Module 37 Quiz: ORC Legal
  • 37

    ORC Prevention and Deterrance

    • ORC Prevention(Reading Assignment)
  • 38

    ORC Appendix

    • ORC Appendix and References
  • 39

    Introduction to Cyber Counterintelligence

    • Welcome to the Cyber Counterintelligence Threat Analysis Program!
    • Group Forum Discussion: Research
  • 40

    Intelligence Overview

    • Types of Cyber Crime (Reading Assignment)
    • Intro to Cyber Investigations - Overview (21:01)
    • How Cyber Criminals Attack (25:35)
    • Conducting Cyber Investigations (05:52)
    • Cyber Investigations 101 (12:06)
    • How to Investigate Email Headers (20:34)
    • Intro to Cyber Investigations Conclusion
    • Quiz: Introduction to Cyber Investigations
  • 41

    Applying Intelligence Methodologies

    • Applying Intelligence Methodologies
    • Assignment: Applying Intelligence
  • 42

    Cyber Terrorism & Hackers

    • Cyber Terrorism in the News
    • Counter Terrorism
  • 43

    Cyber Threats & Concerns

    • Cyber Threat Concerns
  • 44

    MicroDegree Appendix

    • MicroDegree Appendix
  • 45

    Final Exam

    • Preparing for the Exam
    • Exam Application
    • Final Exam: MicroDegree