Course curriculum

  • 1

    Welcome to the CTFI Board Certification Program!

    • Introduction to the CTFI
    • Introduce yourself!
    • Code of Ethics (Reading Assignment)
    • Course Resources
  • 2

    Introduction to Cybersecurity

    • Intro to Cyber Investigations
    • How Cyber Criminals Attack
    • Conducting Cyber Investigations
    • Cyber Investigations 101
    • How to Investigate Email Headers
    • Conclusion / Recap
    • Introduction to Cyber Security Quiz
  • 3

    Introduction to Cyber Warfare

    • Introduction to Cyberwarfare
    • Cyberwarfare (Reading Assignment)
    • Cyberwarfare Quiz
  • 4

    Global Cyber Capabilities and Trends

    • Global Cyber Capabilities and Trends
    • Discussion Assignment: Global Cyber Capabilities and Trends
  • 5

    Global Cyber Threats, Attacks, Vehicles, and Mechanisms (Hacking 101)

    • Cyber Threats - Attacks - Vehicles
    • Reading assignment
    • Global Threats - Prep Review Quiz
  • 6

    Cyber Threat Modeling

    • Threat Modeling Overview
    • Definitions and Motivations
    • Organizational Pre-requisites
    • Scoping the Effort and Kicking Off the Process
    • Identifying External Dependencies and Specifying Use Cases
    • Threat Generation, Threat Analysis and Threat Response
    • Reporting
    • Microsoft's Threat Modeling: Reading Assignment
    • Additional Resources: External Links
    • Cyber Threat Modeling Prep Review Quiz
  • 7

    IT. Security Systems

    • Introduction to I.T Security
    • Information Security Awareness
    • Top Hackers Show us How it's done!
    • 7 Things Every CEO Should Know About Information Security
    • Discussion
  • 8

    Intrusions & Attacks: Cyber Attacks on Retailers

    • Attacks on Retailers: Target Breach
    • Inside a Target Breach
    • Point of Sale System Breaches
    • Discussion-Cyber Attacks on Retailers
  • 9

    Intrusions & Attacks: Personal Information Breaches

    • Intrusion Attacks on Personal Information (Reading Assignment)
    • Top 9 Web Hacking Techniques
    • 5 Most Dangerous New Hacking Techniques
    • Drinkman Indictment
    • Discussion-Drinkman
  • 10

    Intrusions & Attacks: Cyber Attacks on Government

    • Cyber Attacks on Government (Reading Assignment)
    • Cyber Attacks on Government Prep Review Quiz
  • 11

    Intrusions & Attacks: Cyber Attacks on Law Enforcement

    • Discussion
  • 12

    Intrusions & Attacks: Memory Scraping - Parsing Malware

    • Memory & Malware (Reading Assignment)
    • Debuggin Software Memory (Reading Assignment)
    • Discussion
  • 13

    Credit Card Fraud: Payment Processing (e-commerce fraud)

    • eCommerce Fraud & Credit Card Processing
    • Case Study: Home Depot Breach
    • Case Study 2: Update Home Depot Breach
    • Financial Investigations Cheat Sheet
    • eCommerce Fraud: Prep Review Quiz
  • 14

    Investigative Methods: Digital & Computer Forensics

    • Definitive Guide to Digital Forensics
    • Investigating Email Crimes
    • Examining Email Messages
    • Viewing Email Headers
    • Mobile Forensics
    • Forensic Examination of Mobile Devices
    • Digital Forensics: Prep Review Quiz
  • 15

    Investigative Methods: Exploring TOR and the Deep Web

    • The Deep Web!
    • Getting Started with TOR
    • Introducing the TOR Project
    • The Secrets Behind the TOR Browser
    • The Deep Web (Fun Overview)
    • Exploration 1
    • Deep Web: Prep Review Quiz
  • 16

    Investigative Methods: Using Open Source Intelligence

    • Open Source Intelligence (Reading Assignment)
    • Exploring Open Source Intelligence
    • Prep Review Quiz: OSINT
  • 17

    Investigative Methods: Backgroud Investigations

    • Discussion-Background Investigations
  • 18

    Cyber Intelligence & Counterintelligence Operations

    • Counter-Intelligence Methodologies
    • Cyber Terrorism in the News
    • Cyber Counter-Terrorism
    • Cyber Threat Concerns
    • Discussion
  • 19

    Intelligence Methodologies: How to gather intelligence

    • Intelligence Methodologies (Reading Assignment)
    • How to Gather Intelligence - Introduction
    • How to Gather Intelligence - Basic Concepts
    • How To Gather Intelligence - Intel as a Continuous Cycle
    • How to Gather Intelligence - Intel Disciplines
    • How to Gather Intelligence - Threat Intel Landscape
    • How to Gather Intelligence - The Threat Intelligence Journey
    • How to Gather Intelligence - Special Considerations
    • Prep Review Quiz: Intelligence Methodologies
  • 20

    Intelligence Methodologies: Where cyber criminals sell their data & information

    • Gathering Intelligence on Carding Forums
    • Discussion
  • 21

    Intelligence Methodologies: How to Gather Intelligence on Social Media Websites

    • An Overview of Social Media Investigations
    • Social Media Demographics
    • Criminals on Facebook
    • How to be Successful in Social Media Investigations
    • How to Locate Accomplices & Co-conspirators (Belief Propagation)
    • Live Tutorial: Profile Information
    • Facebook Intelligence: The Friends List
    • Facebook Intelligence: The Conversation Wall
    • Facebook Information Tab
    • Live Tutorial: Facebook Wall
    • Facebook Timeline
    • How to Gather Intelligence in Facebook Groups
    • How Fraudsters Create Phishing Schemes
    • How to Avoid the Pitfalls of Private Profiles
    • Subpoenas & Search Warrants
    • How to Locate People on MySpace
    • MySpace Intelligence: Gather Information on the Profile Wall
    • MySpace Intelligence: Details in the Friends List
    • How to Find People on Bebo
    • How to Gather Intelligence from the Bebo Profile
    • Bebo: An Overview Into the Friends List
    • Bebo: A Look Into the Details in Groups
    • LinkedIn: Gathering Intelligence from the Profile
    • Using the Power of Google on LinkedIn
    • How to Use Google's Site Search Effectively for Cyber Investigations
    • How to Utilize Google's Double Quotes
    • What are the Ethical Considerations When doing Social Media Investigations
    • Tools and Resources Available for Social Media Investigations
    • In Conclusion
    • Final Quiz - Basic Social Media Investigations
  • 22

    Intelligence Methodologies: How to Gather Intelligence on eCommerce & Auction Websites

    • eCommerce Fraud Investigations (Reading Assignment)
    • eCrime Investigations - Introduction
    • Where is eCrime Most Prevalent
    • Fencing Vs. eFencing
    • eCommerce Challenges to Investigating Fraudsters
    • Prosecution Challenges
    • Prosecution Requirements
    • Science Meets eCrime
    • eBay The World's Largest Auction Platform
    • Boosters Selling on eBay
    • eBay Fraudsters - Let's Find Them
    • eBay Listing Overview
    • Advanced Search Overview
    • Search Results Overview
    • Auction Listing Details
    • Feedback Systems and How Fraudsters Use Them
    • Ebay Feedback Review - First 30 Days
    • Craigslist Overview
    • Craigslist Listings
    • Craigslist Investigations
    • Google Boolean Searches - Site Search
    • Discussion-eBay Investigation
    • Discussion-Craigslist Investigation:
    • Quiz: eCrime Investigations Quiz
  • 23

    Intelligence Methodologies: How to Gather Intelligence on Chat Websites and Applications

    • Introduction to Gathering Intelligence on Mobile Apps
    • Skype Sign Up
    • Web Platform and Features
    • Skype App and Searching
    • Google Hangouts Intro
    • Google Plus
    • Hangouts Tutorial
    • Google Hangouts Mobile
    • Oovoo
    • Oovoo Chat Window
    • Gathering Intel on Facetime
    • Gathering Intel on Tango
    • Quiz: Chatting Up Your Person of Interest
  • 24

    Counterintelligence Methodologies: 200+ of the Best Open Source Intelligence Resources

    • The Ultimate Guide to OSINT (Reading Assignment)
  • 25

    Counterintelligence Methods: Applying Intelligence Methodologies

    • Intelligence Methodologies
    • Discussion- Applying Intelligence
  • 26

    Counterintelligence Methodologies: Cyber Terrorism & Hackers

    • Cyber Terrorism in the News
    • Counter Terrorism
  • 27

    Counterintelligence Methods: Cyber Threat Concerns

    • Cyber Threat Concerns
  • 28

    Preparation & Response: Data Breach Preparedness

    • How to Prepare for Data Breaches
    • Data Breach Preparedness (Reading Assignment)
    • Prep Review Quiz
  • 29

    Preparation & Response: Preparedness Plan Audit

    • Preparedness Plan Audit Overview
    • Preparedness Plan Audit (Reading Assignment)
    • Discussion-Audit
  • 30

    Preparation & Response: Data Breach Incident responses

    • Incident Response (Reading Assignment)
    • Prep Review Quiz
  • 31

    Preparation & Response: Notification and Disclosure

    • Data Breach Notifications and Disclosure
    • Data Breach Notification and Protection Act
    • Data Breach Charts
    • Discussion
  • 32

    Legal Considerations

    • Introduction to Legal Fundamentals
    • Understanding Your Role as an Investigator
    • Understanding Your Employees Rights
    • The Electronic Communications Privacy Act
    • Understanding Law Enforcement Concerns
    • An Agent of the Law
    • Federal Laws to Prosecute CyberCrimes
    • Legal Considerations Quiz
  • 33

    Search and Siezure

    • Search and Seizure Intro
    • Search and Siezure (Reading Assignment)
  • 34

    Expert Witness Testimony

    • Becoming an Expert Witness
    • Dauberts Standards, What is it?
    • Common Task of an Expert Witness
    • Preparing to Become an Expert Witness
    • Your Role as a Consultant
    • How to Prepare Your Testimony for Court
    • Preparing Forensic and Computer Evidence
    • Summary
  • 35

    Final Exam

    • Final Exam Preparation
    • Board Exam Purchase