In this exciting online course, you will discover the various forms of cyber investigations. By understanding, through this course, where criminals sell their data or how to utilize Social Media Websites to gain intelligence and other avenues, you will be able to identify, investigate and prosecute criminals. Our industry experts will demonstrate the tips and tricks to be more effective in gathering intelligence and conducting investigations! To conclude the course we will test your new found knowledge on the different methods of intelligence gathering, as well as the various different avenues we explore throughout this course.

Curriculum

Different Methods to Gather Intelligence

  • How to Gather Intelligence - Introduction
  • How to Gather Intelligence - Basic Concepts
  • How To Gather Intelligence - Intel as a Continuous Cycle
  • How to Gather Intelligence - Intel Disciplines
  • How to Gather Intelligence - Threat Intel Landscape
  • How to Gather Intelligence - The Threat Intelligence Journey
  • How to Gather Intelligence - Special Considerations

Intelligence Methodologies: Where cyber criminals sell their data & information

  • Gathering Intelligence on Carding Forums

Intelligence Methodologies: How to Gather Intelligence on Social Media Websites

  • An Overview of Social Media Investigations
  • Criminals on Facebook
  • How to be Successful in Social Media Investigations
  • How to Locate Accomplices & Co-conspirators (Belief Propagation)
  • Live Tutorial: Profile Information
  • Facebook Intelligence: The Friends List
  • Facebook Intelligence: The Conversation Wall
  • Facebook Information Tab
  • Facebook Timeline
  • How to Gather Intelligence in Facebook Groups
  • How Fraudsters Create Phishing Schemes
  • How to Avoid the Pitfalls of Private Profiles
  • Subpoenas & Search Warrants
  • How to Locate People on MySpace
  • MySpace Intelligence: Gather Information on the Profile Wall
  • MySpace Intelligence: Details in the Friends List
  • LinkedIn: Gathering Intelligence from the Profile
  • Using the Power of Google on LinkedIn
  • How to Use Google's Site Search Effectively for Cyber Investigations
  • How to Utilize Google's Double Quotes
  • What are the Ethical Considerations When doing Social Media Investigations
  • Tools and Resources Available for Social Media Investigations
  • Introduction to Twitter Investigation Methodologies
  • The New Twitter Profile Layout
  • Exploring Twitter Search
  • Twitter Search - Stolen goods
  • UserID Searches
  • Location Based Searches
  • Link Searches
  • Question Based Searches
  • Advanced Searches
  • Monitoring Tools
  • Gathering Intel via Social Media In Conclusion

Intelligence Methodologies: How to Gather Intelligence on eCommerce & Auction Websites

  • eCommerce Fraud Investigations
  • eCrime Investigations - Introduction
  • Where is eCrime Most Prevalent
  • Fencing Vs. eFencing
  • eCommerce Challenges to Investigating Fraudsters
  • Prosecution Challenges
  • Science Meets eCrime
  • eBay The World's Largest Auction Platform
  • Boosters Selling on eBay
  • eBay Fraudsters - Let's Find Them
  • eBay Listing Overview
  • Advanced Search Overview
  • Search Results Overview
  • Auction Listing Details
  • Feedback Systems and How Fraudsters Use Them
  • Ebay Feedback Review - First 30 Days
  • Craigslist Overview
  • Craigslist Listings
  • Craigslist Investigations
  • Google Boolean Searches - Site Search

Intelligence Methodologies: How to Gather Intelligence on Chat Websites and Applications

  • Introduction to Gathering Intelligence on Mobile Apps
  • Skype Sign Up
  • Web Platform and Features
  • Skype App and Searching
  • Google Hangouts Intro
  • Google Plus
  • Hangouts Tutorial
  • Google Hangouts Mobile
  • Oovoo
  • Oovoo Chat Window
  • Gathering Intel on Facetime
  • Gathering Intel on Tango

What our Students have to Say