Course Name: Advanced E-Commerce Investigation & Intelligence Gathering

Course Hours: 1 # of CPE: 1 Tuition Cost: $199

Course Outline: Do you want to take your online investigative skills to the next level? This is the workshop for you! The Advanced E-Crime Investigation Methodologies takes the skills you learned in the basic workshop and takes those techniques to a whole new level. You will learn how to conduct successful online investigations to identify, isolate and prosecute organized retail crime rings, fraudsters, and employee theft on auction platforms and classified websites.

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment. Please be advised that you may only claim CPE credit for a course once the certificate of completion is issued. The certificate of completion is valid for 2 years.

Key Learning’s
• Advanced methods of Buyer/Seller fraud, Sales of Stolen Goods, Counterfeit Merchandise and Brand Violations.
• Innovative and Closely Guarded Secrets of Elite Law Enforcement’s detection & investigative methods to identify stolen merchandise and fraudsters online
• How to identify multiple seller/fraudster accounts across different auction and classified platforms
• How to identify hidden seller/fraudster accounts through feedback systems
• Prosecution methodologies, documentation, and digital evidence

Course Curriculum
• Introduction to Advanced eCommerce Fraud
• Resources
• The Demographics of Online Fraudsters
• Trends and Patterns of Online Fraudsters
• The Profile of an Online Fraudster
• Types of Auction Fraud
• Patterns in Fraudulent Behavior
• Research Results and Types of Auction Fraud
• Analyze Fraudulent Behavior
• eBay Investigations
• eBay and Terapeak
• Hot Topic Research on Terapeak
• eBay Investigative Tips
• Craigslist Investigation
• Craigslist Investigation Tips
• Facebook Marketplace (Oodle) Introduction
• Facebook Marketplace – Searching Individuals
• Facebook Marketplace Investigative Tips
• Google Advanced Operators
• Google Site Search: eforcity
• Google Site Search
• Email Header Information
• Meta Data
• e-commerce Laboratory
• Conclusion
• Final Exam: Advanced e-Crime Investigation Methodologies

Course Name: Advanced Social Media Intelligence Gathering

Course Hours: 1 # of CPE: 1 Tuition Cost: $199

Course Outline: You will examine these new innovative ideas in-depth as they are introduced by our experienced instructors which come from the world of e-commerce, loss prevention, law enforcement, and the intelligence community to bring you an action-packed seminar that will leave you eager to return to work, to utilize your new-found skill set.

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment. Please be advised that you may only claim CPE credit for a course once the certificate of completion is issued. The certificate of completion is valid for 2 years.

Key Learning’s
• Navigate the website, search, advanced search, sign-up, register a profile
• Learn about connections, friend’s request, & privacy settings
• Identify fraudsters, criminals, and illegal information Identify personal details, addresses, phone numbers, email address & more
• Learn how to bypass privacy settings, visualize seller networks and gather intelligence
• Identification of criminal activity and what is needed to prosecute
• Evidence gathering and chain of custody for digital evidence
• Legalities of online investigations, terms of service violations and subpoenas

Course Curriculum
Advanced Social Media Investigations
• An overview of Advanced Social Media Investigations
• Defining Open Source Intelligence
• A World of Sock Puppets
• Domain Names
• Username Workflow
• Search Engines
• Facebook
• Twitter
• Instagram
• YouTube
• Hootsuite and Sprout Social
• Quiz: Advanced Social Media Investigations
Legal Fundamentals of Cyber Investigations
• Legal Fundamentals (Reading Assignment)
• Introduction to Legal Fundamentals
• Understanding Your Role as a Corporate Investigator
• Understanding Your Employees Rights
• The Electronic Communications Privacy Act
• Understanding Law Enforcement Concerns
• An Agent of the Law
• Federal Laws to Prosecute Cybercrimes
• Becoming an Expert Witness
• Dauberts Standards
• Common Task of an Expert Witness
• Preparing to Become an Expert Witness
• Your Role as a Consultant
• How to Prepare Your Testimony for Court
• Preparing Forensic and Computer Evidence
• Quiz: Legal Fundamentals of Cyber Investigations
Documenting Social Media Evidence
• Documenting Social Media Evidence (Reading Assignment)
• Quiz: Documenting Social Media Evidence
Digital Evidence
• Social Media Evidence (Reading Assignment)
• Final Exam: Digital Evidence

Course Name: An Exploration Into Hacking 101

Course Hours: 1 # of CPE: 1 Tuition Cost: $199

Course Outline: In this exciting course, we are going to discuss the dangers cyber threats face to our organizations and agencies around the world. Then we will watch how top hackers show us how it’s done.

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment. Please be advised that you may only claim CPE credit for a course once the certificate of completion is issued. The certificate of completion is valid for 2 years.

Course Curriculum
Global Cyber Threats, Attacks, Vehicles, and Mechanisms
• Principles of Hacking
• The Dangers of Cyber Threats
Case Studies
APA Sample
• Sample Experiment
• Turning the Tables on Cyber Attacks
• Cyber Trends
• Sophos Security Threat Report
• Cisco Threat Report

Course Name: Auction Fraud Investigation Methodologies

Course Hours: 2 # of CPE: 2 Tuition Cost: $199

Course Outline: In this exciting online course, we will be covering some of the most innovative and closely guarded secrets of Elite Law Enforcements and Cyber Investigators into conducting online auction fraud investigations. We will be exploring detection & investigative methods to identify stolen merchandise and fraudsters online! An expanded history of eCommerce and Auction Platforms, Buyer/Seller fraud, and Organized Retail Crime. The methods of buyer/seller fraud, sales of stolen goods, counterfeit merchandise and brand violations.

Key Learnings
• How to identify multiple seller/fraudster accounts across different auction and classified platforms
• How to identify hidden seller/fraudster accounts through feedback systems
• Prosecution methodologies, documentation, and digital evidence

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment. Please be advised that you may only claim CPE credit for a course once the certificate of completion is issued. The certificate of completion is valid for 2 years.

Course Curriculum
eCrime Investigation Methodologies
• eCrime Investigations – Introduction
• Where is eCrime Most Prevalent
• Fencing Vs. eFencing
• eCommerce Challenges to Investigating Fraudsters
• Prosecution Challenges
• Prosecution Requirements
• Science Meets eCrime
• Ebay The World’s Largest Auction Platform
• Boosters Selling on Ebay
• Ebay Fraudsters – Let’s Find Them
• Ebay Listing Overview
• Advanced eBay Search Overview
• eBay Search Results Overview
• Auction Listing Details
• Feedback Profile Overview
• Auction Analysis for Fraud
• Feedback Systems and How Fraudsters Use Them
• Ebay Feedback Review – First 30 Days
• Craigslist Overview
• Craigslist Listings
• Craigslist Investigations
• Google Boolean Searches – Site Search
• Group Forum Discussion: eBay Investigation
• Group Forum Discussion: Craigslist Investigation
• Final Exam: eCrime Investigations

Course Name: How To Become An Expert Witness

Course Hours: 1 # of CPE: 1 Tuition Cost: $199

Course Outline: In this course, we discuss the elements and process of becoming an expert witness. We discuss the common tasks of becoming an expert witness, your role as a consultant, and even how to prepare for court. Build your professional resume today and become known as an expert witness in your field.

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment. Please be advised that you may only claim CPE credit for a course once the certificate of completion is issued. The certificate of completion is valid for 2 years.

Course Curriculum
Expert Witness Testimony
• What it is like becoming an Expert Witness
• Daubert’s Standards
• Common Task of an Expert Witness
• Preparing to Become an Expert Witness
• Your Role as a Consultant
• How to Prepare Your Testimony for Court
• Preparing Forensic and Computer Evidence
• Summary
• Final Exam

Course Name: Cyber Counter Intelligence Methodologies

Course Hours: 1 # of CPE: 1 Tuition Cost: $199

Course Outline: In this exciting online course, we will teach you about cyber intelligence methodologies, how to apply the methodologies to your environment and more. We will explore cyber terrorism and hackers in recent news and how cyber-terrorism will impact us in the future. To conclude this course will we discuss cyber threats as a whole and then test your knowledge.

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment. Please be advised that you may only claim CPE credit for a course once the certificate of completion is issued. The certificate of completion is valid for 2 years.

Course Curriculum
Applying Intelligence Methodologies
• Intelligence Methodologies
Cyber Terrorism & Hackers
• Cyber Terrorism in the News
• Counter-Terrorism
Cyber Threat Concerns
• Cyber Threat Concerns
• Final Assignment

Course Name: Digital Forensics & Computer Forensics

Course Hours: 1 # of CPE: 1 Tuition Cost: $199

Course Outline: In this program, you will learn the basics of digital and computer forensics. We will cover a variety of topics like email headers, mobile forensics and more. If you have a passion to learn about digital evidence, then this course is for you.

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment. Please be advised that you may only claim CPE credit for a course once the certificate of completion is issued. The certificate of completion is valid for 2 years.

Course Curriculum
Investigating Digital and Computer Forensics
• Definitive Guide to Digital Forensics
• Investigating Email Crimes
• Examining Email Messages
• Viewing Email Headers
• Forensic Examination of Mobile Devices
• Final Exam

Course Name: How To Conduct Investigations On The Deep Web

Course Hours: 1 # of CPE: 1 Tuition Cost: $199

Course Outline: You will learn firsthand over 20 of the most significant deep hidden websites through TOR where the criminal element is transacting online and selling drugs, weapons, children, sex, stolen goods, counterfeit merchandise, stolen credit cards, customer information, and you can even hire an assassin to take someone out. These are just to name a few of the sites we will explore. We will take your investigative expertise to a whole new level, guaranteed.

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment. Please be advised that you may only claim CPE credit for a course once the certificate of completion is issued. The certificate of completion is valid for 2 years.

Course Curriculum
• Exploring the Deep Web
• DarkWeb
• The Deep Web!
• Getting Started with TOR (Step by Step)
• Introducing the TOR Project
• The Deep Web (Overview)
• Exploration 1
VPN Services
• Steps to buy and set up a VPN service to remain anonymous
• Hidden Wiki 2017
• Black Market Links 2017
• Deep Web Drug Markets 2017
• Hitman and Escrow Dark Web Links 2017
• Directories and Lists 2017
• Tor Wiki (Resource)
• The Secrets Behind the TOR Browser
• What the @#$% is a Bitcoin anyway?
• Final Exam: Deep Web

Course Name: Credit Cards & Payment Processing Fraud Investigations

Course Hours: 1 # of CPE: 1 Tuition Cost: $199

Course Outline: In this intriguing course, we discuss eCommerce fraud as it relates to credit card processing. We will explore a case study on the Home Depot breach and how we can use this learning lesson to prevent our organizations from being attacked by hackers.

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment. Please be advised that you may only claim CPE credit for a course once the certificate of completion is issued. The certificate of completion is valid for 2 years.

Course Curriculum
• Credit Card Fraud
• eCommerce Fraud & Credit Card Processing
• Case Study: Home Depot Breach
• Case Study 2: Update Home Depot Breach
• Financial Investigations Cheat Sheet
• Quiz

Course Name: Introduction To Cyber Warfare

Course Hours: 1 # of CPE: 1 Tuition Cost: $199

Course Outline: In this exciting online course, we will teach you about cyber warfare. We will explore cyber warfare on a large scale and how cyber warfare can impact us in the future as well as our day to day lives. To conclude this course we will test your knowledge on how to prepare and prevent against cyber warfare.

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment Please be advises that you may only claim CPE credit for a course once after the certificate of completion is issued. The certificate of completion is valid for 2 years.

Course Curriculum
Introduction to Cyberwarfare
• Cyberwarfare 101
• Cyberwarfare (Reading Assignment)
• Cyberwarfare Quiz

Course Name: Introduction To Cyber Crime For Finance Professionals

Course Hours: 1 # of CPE: 1 Tuition Cost: $199

Course Outline: This exciting course provides the student with the framework to understand cybersecurity risk and the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. We will explore how hackers target finance professionals and how to spot their attacks.
Many of today’s top tools of the forensic trade will be explored and presented to the student. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the “cyber-criminal.” It is no longer a matter of “will your organization be comprised (hacked)?” but, rather, “when?” Today’s battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into almost every facet of modern-day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you.

Key learning’s
• Define Cyber Crime
• Understand the scope and nature of cybercrime
• Understand how cybercriminals attack finance professionals
• Understand the technical fundamentals of cyber investigations
• Collect evidence in cyber investigations
• Describe the guidelines and requirements that must be met to fulfill the role of case agent during basic cyber-crime investigations

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment. Please be advised that you may only claim CPE credit for a course once the certificate of completion is issued. The certificate of completion is valid for 2 years.

Curriculum
Intro to Cybercrime for Finance
• Introduction to Cyber Crime for Finance

Case Studies
• Case Study 1: Scammers nearly cheat Caledonia Schools out of $163K
• Case Study 2: Examining high-dollar e-mail scams
• Case Study 3: Vendor Email Hacked
• Final Quiz

Course Name: Social Media Investigations Methodologies

Course Hours: 1 # of CPE: 1 Tuition Cost: $199

Course Outline: This is an exciting online course where you will learn how to conduct social networking investigations on websites like Facebook, LinkedIn and Twitter. This in-depth seminar will leave you with a wealth of new concepts to help you investigate criminal acts and suspects. Get the knowledge you have been lacking, today!

Upon completion of this exciting program you will close more online investigations then you ever thought was possible, recover more losses for your organization and successfully prosecute more fraudsters in a 1/4 of the time… Guaranteed!

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment. Please be advised that you may only claim CPE credit for a course once the certificate of completion is issued. The certificate of completion is valid for 2 years

Key learning’s
• Navigate the website, search, advanced search, sign-up, register a profile
• Learn about connections, friend’s request, & privacy settings
• Identify fraudsters, criminals, and illegal information Identify personal details, addresses, phone numbers, email address & more.
• Learn how to bypass privacy settings, visualize seller networks and gather intelligence
• Identification of criminal activity and what is needed to prosecute

Platform explored
• Facebook
• MySpace
• Bebo
• Google+

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment. Please be advised that you may only claim CPE credit for a course once the certificate of completion is issued. The certificate of completion is valid for 2 years.

Course Curriculum
• Basic Social Media Investigations
• An Overview of Basic Social Media Investigations
• Facebook Search
• Locating People on Facebook
• Facebook Profile
• Facebook Search Tool
• Facebook Private Profile Information
• Twitter
• Twitter Search
• Twitter Mobile App
• YouTube
• YouTube Search
• Google+
• Google+ Search
• Ethical Considerations
• Final Exam – Basic Social Media Investigations

Course Name: The In’s And Out’s Of A Data Breach

Course Hours: 1 # of CPE: 1 Tuition Cost: $199

Course Outline: Defend yourself from data breaching! In this exciting course, we will give you the tips and tricks you need to protect yourself from a potential data breach. By enacting a preparedness plan, you can stay one step ahead of intruders.

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment. Please be advised that you may only claim CPE credit for a course once the certificate of completion is issued. The certificate of completion is valid for 2 years.

Course Curriculum
• Preparation & Response: Data Breach Preparedness
• How to Prepare for Data Breaches
• Data Breach Preparedness
• Preparation & Response: Preparedness Plan Audit
• Preparedness Plan Audit Overview
• Preparedness Plan Audit
• Preparation & Response: Data Breach Incident responses
• Incident Response
• Preparation & Response: Notification and Disclosure
• Data Breach Notifications and Disclosure
• Data Breach Notification and Protection Act
• Data Breach Charts
• Testing Your Knowledge
• Quiz

Course Name: The Legal Fundamentals Of Cyber Investigations

Course Hours: 1 # of CPE: 1 Tuition Cost: $199

Course Outline: Get ready for a phenomenal online course! You will learn all about the legal fundamentals of conducting cyber-related investigations and intelligence gathering. Jump into the minds of the nations best that protect our cyber walls, and how you can protect yourself while conducting cyber investigations.

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment. Please be advised that you may only claim CPE credit for a course once the certificate of completion is issued. The certificate of completion is valid for 2 years.

We will explore the laws that help to
• prosecute cyber criminals
• how to effectively gather evidence
• support in the prosecution efforts

We will also be exploring the fundamentals of building a business
• how to become an expert witness
• start a practice as an expert witness
• best methods to prepare for testimony in this riveting course
• Course Benefits:

Course Curriculum
• Introduction to Legal Fundamentals
• Understanding Your Role as an Investigator
• Understanding Your Employees Rights
• The Electronic Communications Privacy Act
• Understanding Law Enforcement Concerns
• An Agent of the Law
• Federal Laws to Prosecute CyberCrimes
• Becoming an Expert Witness
• Dauberts Standards, What is it?
• Common Task of an Expert Witness
• Preparing to Become an Expert Witness
• Your Role as a Consultant
• How to Prepare Your Testimony for Court
• Preparing Forensic and Computer Evidence
• Summary
• Final Exam: Legal Fundamentals of Cyber Investigations

Course Name: How To Work With Informants in Retail Loss Prevention

Course Hours: 1 # of CPE: 1 Tuition Cost: $199

Course Outline: Every year billions of dollars in merchandise losses go undetected due to the lack of creditable information to aid in the investigation and prosecution of known offenders. Confidential and reliable Informants have long played a key role in helping law enforcement to resolve both complex and significant criminal activities within their jurisdiction and have now become a necessity within the loss prevention community.

The 21st century has brought with it a new breed of criminal and the necessity for creditable information from trustworthy sources. The ability to identify credible informants, gather information on criminal activities and build trust with informants, all play a crucial role in identifying, investigating and prosecuting criminal activities against your organization.

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment. Please be advised that you may only claim CPE credit for a course once the certificate of completion is issued. The certificate of completion is valid for 2 years

Key Learning’s
• How to recruit informants
• Working with and motivating informants
• Building creditability and trust
• Documenting and preserving information
• Working with law enforcement and obtaining Search Warrants with the use of informants
• Non-traditional uses of informants, such as, Controlled Steals
• Debriefing informant
• Safe handling of informants
• Liability of utilizing informants
• Program development – how to integrate this new tool into your loss prevention program and bring success

Course Curriculum
• How to Utilize Informants in Retail Loss Prevention
• Introduction to Informants
• Suitability
• Trust and Confidentiality
• Safe Handling of Informants
• Legal Liabilities
• Final Exam: Informants

Course Name: Learn The A-Z’s Of Cyber Investigations

Course Hours: 1 # of CPE: 1 Tuition Cost: $199

Course Outline: Cyber Investigators work at all levels of the federal government which includes FBI, NSA, CIA, USS, DOD, and DEA. However, they also work at large multi-national corporations as well protecting organizations from the theft of proprietary information, trade secrets, assets, merchandise, customer information and more. This course takes you from start to finish teaching you basics behind cyber-counterintelligence operations, methodologies and how to be effective.

Even better yet! This online course and all the resources are completely online and self-study! No matter when you want it, where you want it or where you are located around the world, it will be available 24/7/365.

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment. Please be advised that you may only claim CPE credit for a course once the certificate of completion is issued. The certificate of completion is valid for 2 years.

Course Curriculum
• Applying Intelligence Methodologies
• Intelligence Methodologies
• Discussion: Applying Intelligence
• Cyber Terrorism & Hackers
• Cyber Terrorism in the News
• Counter Terrorism
• Cyber Threats & Concerns
• Final Exam

Course Name: Learn How To Investigate Hackers

Course Hours: 1 # of CPE: 1 Tuition Cost: $199

Course Outline: This exciting course provides the student with the framework to understand cyber investigations and the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute.

Many of today’s top tools of the forensic trade will be explored and presented to the student. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the “cyber-criminal.” It is no longer a matter of “will your organization be comprised (hacked)?” but, rather, “when?” Today’s battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into almost every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you.

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment. Please be advised that you may only claim CPE credit for a course once the certificate of completion is issued. The certificate of completion is valid for 2 years.

Key learning’s
• Define Cyber Crime
• Understand the scope and nature of cybercrime
• Understand the technical fundamentals of cyber investigations
• Collect evidence in cyber investigations
• Describe the guidelines and requirements that must be met to fulfill the role of case agent during basic cyber-crime investigations

Course Curriculum
• Introduction to Cyber Investigations
• Intro to Cyber Investigations
• How Cyber Criminals Attack
• Conducting Cyber Investigations
• Cyber Investigations 101
• How to Investigate Email Headers
• Intro to Cyber Investigations Conclusion
• Final Exam: Introduction to Cyber Investigations

Course Name: Online Classified Investigations

Course Hours: 1 # of CPE: 1 Tuition Cost: $199

Course Outline: The McAfee Institute® brings to you this exciting comprehensive course Kijiji, Oddle, and Facebook Market Place Online Investigations, brings together 15 years of cyber intelligence, loss prevention and law enforcement experience to illustrate and teach you the necessary skills to conduct successful online investigations in an effort to isolate organized retail crime rings, fraudsters, and employee theft.

Key learning’s
• An expanded history of Classified platforms, Buyer/Seller fraud, and Organized Retail Crime on Kijiji, Facebook Marketplace, eBay Classifieds and Oodle!
• What intelligence information is available on these platforms that will aid in your investigation
• Information on innovative detection methods to identify stolen merchandise and fraudsters
• How to identify multiple seller accounts across different platforms
• How to identify hidden seller accounts through feedback systems
• What tools and resources are available
• Platform contacts and use of subpoenas

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment. Please be advised that you may only claim CPE credit for a course once the certificate of completion is issued. The certificate of completion is valid for 2 years.

Course Curriculum
• Classified Investigation Methodologies
• Classified Investigations – Introduction
• Where is eCrime Most Prevalent
• Fencing vs. eFencing
• eCommerce Challenges to Investigating Fraudsters
• Prosecution Challenges
• Prosecution Requirements
• Science Meets eCrime
• Craigslist Overview
• Craigslist Listings
• Craigslist Investigations
• Google Boolean Searches – Site Search
• Group Forum Discussion: Craigslist Investigation
• Final Exam: Online Classified Investigations Quiz

Course Name: The Top 20 Intelligence Resources On The Net

Course Hours: 1 # of CPE: 1 Tuition Cost: $199

Course Outline: In this exciting and stunning course, we will show you first hand the websites and resources that are not only necessary in your investigative toolbox (but a requirement) and how to utilize them effectively and efficiently if you are going to be successful this year!

Key Learnings
• Where you can find personal details on your subject
• Where & how you can find and locate social media accounts
• We will explore where and how you can find eCommerce, auction, and classified seller accounts
• We will explore where the following types of criminal activity is happening (Sales of Stolen Goods (eFencing)
• How to set up a cyber investigators computer, sock puppet accounts, proxies, and aliases to conduct your searches with complete anonymity

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment. Please be advised that you may only claim CPE credit for a course once the certificate of completion is issued. The certificate of completion is valid for 2 years.

Course Curriculum
• Open Source Intelligence Gathering Methodologies
• Open Source Intelligence Gathering Methodologies
• Resources
• Exploring the Deep Web
• DarkWeb
• The Deep Web!
• Introducing the TOR Project
• Getting Started with TOR (Step by Step)
• The Deep Web (Overview)
• Exploration 1
VPN Services
• Steps to buy and set up a VPN service to remain anonymous
• Hidden Wiki 2017
• Black Market Links 2017
• Deep Web Drug Markets 2017
• Hitman and Escrow Dark Web Links 2017
• Directories and Lists 2017
TOR Wiki
• The Secrets Behind the TOR Browser
• What the @#$% is a Bitcoin anyway?
• Closing Statements
• Top 20 Intelligence Resources on the Net Closing Statements
• Open Source Intelligence Quiz
• Exam: Open Source Intelligence

Course Name: Twitter Investigation Methodologies

Course Hours: 1 # of CPE: 1 Tuition Cost: $199

Course Outline: Learn some of the most advanced investigative techniques utilized on the Twitter platform. Come along with us on an exciting exploration of the twitter platform with McAfee Institute’s world-renowned speakers and intelligence guru’s. They share with you the most successful & effective investigative strategies known within the industry to help gather the crucial intelligence you need to drive results. Twitter has gone through several huge changes over the last few months and we are the first to bring to you these new insights which will be critical to your success, in this new environment.

Key Learnings
• How to locate persons of interest
• How to identify pertinent information quickly and effectively
• Locate and identify multiple types of criminal activity
• Locate the individuals responsible for criminal activity

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment. Please be advised that you may only claim CPE credit for a course once the certificate of completion is issued. The certificate of completion is valid for 2 years.

Course Curriculum
• Twitter Investigation Methodologies
• Introduction to Twitter Investigation Methodologies
• The New Twitter Profile Layout
• Exploring Twitter Search
• Twitter Search – Stolen Goods
• UserID Searches
• Location Based Searches
• Link Searches
• Question-Based Searches
• Advanced Searches
• Monitoring Tools
• Resources
• An Exploration of Hootsuite
• How to Utilize HootSuite
• How to Set Up Tabs & Streams
• How to Add a Social Network
• Navigating Your Profile
• Publishing a Message
• Start Engaging Your Audience
• How to Create a Search Stream
• Monitoring Advanced Streams
• How to Monitor Key Words
• How to Use Suggestions
• How to Create an Analytics Report
• Twitter Investigation Methodologies Quiz
• Twitter Investigations Quiz

Course Name: Learn How To Gather Effective Intelligence Online

Course Hours: 1 # of CPE: 1 Tuition Cost: $199

Course Outline: This online course unlocks invaluable tutorials, methodologies, and advice from the cyber expert and best-selling author and CEO of the McAfee Institute Joshua P. McAfee and his team of industry experts.

Key Learnings
• How to segment social networks effectively
• How to create undercover accounts that cannot be traced back to you
• How to spy on your persons of interest and not be detected
• How to make the most of the intelligence gathering process
• How to optimize your investigative tactics for the web
• How to kick-start the intelligence gathering process for success in any case
• A comprehensive guide to the deep dark web and online resources for intelligence gathering and more!

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment. Please be advised that you may only claim CPE credit for a course once the certificate of completion is issued. The certificate of completion is valid for 2 years.

Course Curriculum
• Learning Modules
• Defining OSINT
• A World of Sock Puppets
• Documenting Social Media Investigations
• Keep Yourself Protected
• Which Domain Tools to Use
• Social Monitoring and Tracking Suspects on Twitter
• Facebook Criminals: An Inside Look at Dumb Criminals Posting Criminal Acts Online
• Facebook Graph Search
• Facebook Intelligence: The Friends List
• Facebook Conversation Wall
• Google Advanced Searches
• Searching Multiple Platforms
• Digital Case File
• In conclusion
• Exploring the Deep Web
• The Deep Web!
• Introducing the TOR Project
• Getting Started with TOR (Step by Step)
• The Deep Web (Overview)
• Exploration 1
VPN Services
• Steps to buy and set up a VPN service to remain anonymous
• Hidden Wiki 2017
• Black Market Links 2017
• Deep Web Drug Markets 2017
• Hitman and Escrow Dark Web Links 2017
• Directories and Lists 2017
• Tor Wiki (Resource)
• The Secrets Behind the TOR Browser
• What the @#$% is a Bitcoin anyway?
• End of Course Exam

Course Name: Investigative Interviewing Methodologies

Course Hours: 4 # of CPE: 4 Tuition Cost: $499

Course Outline: Investigative interviewing methodologies like you have never experienced before This is an online course, where you will learn how to conduct successful investigative interviews with effective new concepts to acquire confessions from the guilty. We are taking over 25 years of hands-on experience conducting investigative interviews and sharing with you our insights into what contributes to their success and failures.

Students will continue to build upon their interviewing techniques that have previously been learned, identify signs of deception, develop new rationalizations, build rapport and obtain an admission of guilt (or eliminate them as a person of interest). Lastly, we will explore what is needed for a clean separation of employment and/or prosecution.

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment. Please be advised that you may only claim CPE credit for a course once the certificate of completion is issued. The certificate of completion is valid for 2 years.

Course Curriculum
• Investigation & interview preparation
• Investigation Information & Case Development
• Investigation Steps & Procedures
• Professionals Demeanor
• Preparation for the Interview Process
• Information & Fact Gathering
• Understanding what violation has occurred or possibly occurred
• Effective interviewing techniques
• How to Develop Rapport & Gain Buy-In (Failure is not an option)
• Verbal and Non-Verbal Clues (What you might be missing & why)
• Establishing Credibility & Trust (How to do it quickly and effectively)
• Rationalizations (Do you really know who you are talking to), doing your homework?
• Obtaining the admission
• What do you need from your company to get the correct disposition (verbal, in writing, recordings, policy violation, criminal activity) to support termination or prosecution?
• How to support the termination process of the company and minimize liability (i.e. Unemployment benefits, legal, and lawsuits).
• Testing for Submission & Soft Accusations (What happens when they fail?)
• Successful ways to overcome denials & get back on track
• Closing the interview
• How to properly exit the employee/subject from the location (who is involved)
• How to properly terminate the employee from employment (who is involved)
• How to deal with threats, inappropriate behavior and who to notify.
• How to deal with potential workplace violence or violent people.
• Telephone Interviewing Techniques & Methodologies, what works and doesn’t work, the nitty-gritty.

Course Name: Learn All About Risk Management & How To Be Effective

Course Hours: 1 # of CPE: 1 Tution Cost: $199

Course Outline: You will learn several structured, risk management approaches that guide information security decision-making. Course topics include: developing and maintaining risk assessments (RA); developing and maintaining risk management plans (RM); regulatory and legal compliance issues affecting risk plans; developing a control framework for mitigating risks; risk transfer; business continuity and disaster recovery planning from the information security perspective.

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment. Please be advised that you may only claim CPE credit for a course once the certificate of completion is issued. The certificate of completion is valid for 2 years.

Course Curriculum
• Risk Management for Supervisors & Management
• Resources
• Introduction and course overview
• Activity: PreTest
• Understanding Risk
• Risk Management Activities
• Assessing Risk
• GM Case Study Discussion
• Responding to Risk
• GM Case Study Discussion #2
• Resourcing Controls
• Discussion
• Reaction Planning
• Discussion 2
• Reporting and Monitoring
• Reviewing and Evaluating Framework
• Wrap Up

Course Name: Learn The In’s & Out’s Of Cyber Investigations

Course Hours: 5 # of CPE: 5 Tuition Cost: $499

Course Outline: In this exciting online course, you will discover the various forms of cyber investigations. By understanding, through this course, where criminals sell their data or how to utilize Social Media Websites to gain intelligence and other avenues, you will be able to identify, investigate and prosecute criminals. Our industry experts will demonstrate the tips and tricks to be more effective in gathering intelligence and conducting investigations! To conclude the course we will test your new found knowledge on the different methods of intelligence gathering, as well as the various different avenues we explore throughout this course.

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment. Please be advised that you may only claim CPE credit for a course once the certificate of completion is issued. The certificate of completion is valid for 2 years.

Course Curriculum
• Different Methods to Gather Intelligence
o How to Gather Intelligence – Introduction
o How to Gather Intelligence – Basic Concepts
o How To Gather Intelligence – Intel as a Continuous Cycle
o How to Gather Intelligence – Intel Disciplines
o How to Gather Intelligence – Threat Intel Landscape
o How to Gather Intelligence – The Threat Intelligence Journey
o How to Gather Intelligence – Special Considerations
• Where cybercriminals sell their data & information
o Gathering Intelligence on Carding Forums
• How to Gather Intelligence on Social Media Websites
o An Overview of Social Media Investigations
o Criminals on Facebook
o How to be Successful in Social Media Investigations
o How to Locate Accomplices & Co-conspirators (Belief Propagation)
o Live Tutorial: Profile Information
o Facebook Intelligence: The Friends List
o Facebook Intelligence: The Conversation Wall
o Facebook Information Tab
o Facebook Timeline
o How to Gather Intelligence in Facebook Groups
o How Fraudsters Create Phishing Schemes
o How to Avoid the Pitfalls of Private Profiles
o Subpoenas & Search Warrants
o How to Locate People on MySpace
o MySpace Intelligence: Gather Information on the Profile Wall
o MySpace Intelligence: Details in the Friends List
o LinkedIn: Gathering Intelligence from the Profile
o Using the Power of Google on LinkedIn
o How to Use Google’s Site Search Effectively for Cyber Investigations
o How to Utilize Google’s Double Quotes
o What are the Ethical Considerations When doing Social Media Investigations
o Tools and Resources Available for Social Media Investigations
o Introduction to Twitter Investigation Methodologies
o The New Twitter Profile Layout
o Exploring Twitter Search
o Twitter Search – Stolen Goods
o UserID Searches
o Location Based Searches
o Link Searches
o Question-Based Searches
o Advanced Searches
o Monitoring Tools
o Gathering Intel via Social Media In Conclusion
• How to Gather Intelligence on eCommerce & Auction Websites
o eCommerce Fraud Investigations
o eCrime Investigations – Introduction
o Where is eCrime Most Prevalent
o Fencing Vs. eFencing
o eCommerce Challenges to Investigating Fraudsters
o Prosecution Challenges
o Science Meets eCrime
o eBay The World’s Largest Auction Platform
o Boosters Selling on eBay
o eBay Fraudsters – Let’s Find Them
o eBay Listing Overview
o Advanced Search Overview
o Search Results Overview
o Auction Listing Details
o Feedback Systems and How Fraudsters Use Them
o eBay Feedback Review – First 30 Days
o Craigslist Overview
o Craigslist Listings
o Craigslist Investigations
o Google Boolean Searches – Site Search
• How to Gather Intelligence on Chat Websites and Applications
o Introduction to Gathering Intelligence on Mobile Apps
o Skype Sign Up
o Web Platform and Features
o Skype App and Searching
o Google Hangouts Intro
o Google Plus
o Hangouts Tutorial
o Google Hangouts Mobile
o Oovoo
o Oovoo Chat Window
o Gathering Intel on Facetime
o Gathering Intel on Tango

Course Name: Mobile App Investigations

Course Hours: 5 # of CPE: 5 Tuition Cost: $499

Course Outline: The Mobile App Investigation Program is designed to provide investigators with the training necessary to complete forensically sound, data acquisitions of digital evidence from social networking applications.

This incredible online instructor-led training program is destined to be the most exciting programs to hit the industry. There is nothing out there in the terms of mobile app intelligence and investigations training that match the content, real-world expertise, up-to-date tutorials and exercises offered in this incredible program.

You will learn all of the MOST POPULAR social media sites available as mobile applications, chat tools, OSINT and more that we will face over the next year. As well as the most SECRETIVE and closely guarded intelligence and investigative techniques we have to offer!

Key Learnings
• Social Media Investigation Methodologies
• Social Media Intelligence Processes
• Social Media Mobile Applications
• Open Source Intelligence Methodologies
• Legal Fundamentals Relating to Cyber Investigations

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment. Please be advised that you may only claim CPE credit for a course once the certificate of completion is issued. The certificate of completion is valid for 2 years.

Course Curriculum
• Welcome to Mobile App Investigations
o Introduction
o Introduce yourself!
• Basic Social Media Investigations
o An Overview of Basic Social Media Investigations
o Facebook Search Techniques
o Locating People on Facebook
o Exploring the Facebook Profile
o Facebook Search Tool
o Facebook Private Profile Information
o An Exploration into Twitter
o Twitter Search Techniques
o Twitter Mobile App
o An Exploration into YouTube
o YouTube Search
o An Exploration into Google+
o Google+ Search Techniques
o Ethical Considerations
• Advanced Social Media Investigations
o Advanced Social Media Introduction
o Open Source Intelligence
o Anatomy of Social Media
o An Exploration into Domain Names
o Username Workflow
o How to Utilize Search Engines
o Advanced Facebook Search Techniques
o Advanced Twitter Search Techniques
o Advanced Instagram Search Techniques
o Advanced YouTube Search Techniques
o How to Use HootSuite and SproutSocial
• Open Source Intelligence
o Open Source Intelligence Explored
o A World of Sock Puppets
o Keep Yourself Protected
o Criminals: An Inside Look at Dumb Criminals Posting Criminal Acts Online
o Exploring TOR
o Exploring the BitCoin
o The Secrets Behind the TOR Browser
o Digital Case File
o An Exploration into the Deep Web
• Open Source Intelligence Resources
o Open Source Summit Resources
• Cell Phone & Mobile Device Forensics
o Intro to Mobile Forensics
o Mobile Forensics Acquisition
o Mobile Forensics Examination & Analysis
o Procedures and Principles
o Mobile Phone Acquisition/Examination/Reporting (Reading Assignment)
• Mobile Apps Intelligence & Investigations
o Tinder Intelligence & Investigations
o Skype Intelligence & Investigations
o SnapChat Intelligence & Investigations
o Kik Intelligence & Investigations
o WeChat Intelligence & Investigations
o Tango Intelligence & Investigations
o Viber Intelligence & Investigations
o QQ Intelligence & Investigations
o LINE Intelligence & Investigations
o Yik Yak Intelligence & Investigations
• Legal Fundamentals
o Legal Fundamentals (Reading Assignment)
o Legal Fundamentals Discussion
o Additional Resource: DOJ Prosecuting Computer Crimes Manual
• Final Exam

Need more help with this?
Support Center

Thanks for your feedback.