Companies Home Search Profile

AML Forensics in Crypto: Hackers' Laundering Blueprints

Focused View

Web3AML Group

2:33:53

13 View
  • 1. The concept of blockchain from the point of view of hackers.mp4
    02:25
  • 2. What are hackers and governments stealing cryptocurrency for.mp4
    03:05
  • 3. Types of blockchain transactions.mp4
    04:11
  • 1. Tools used for analysis.mp4
    10:08
  • 1. Cryptocurrency laundering through crypto gambling.mp4
    07:46
  • 2. Cryptocurrency laundering through the purchase of goods.mp4
    03:26
  • 3. Cryptocurrency laundering through the sale of stolen crypto.mp4
    03:28
  • 4. Cryptocurrency laundering through exchange of crypto for fiat.mp4
    03:37
  • 5. Cryptocurrency laundering through mixers.mp4
    03:52
  • 6. Cryptocurrency laundering through Custodial Staking.mp4
    04:15
  • 7. Cryptocurrency laundering through Non-Custodial Staking.mp4
    04:49
  • 8. Cryptocurrency laundering through Liquidity Staking.mp4
    03:09
  • 9. Cryptocurrency laundering through ATMs.mp4
    02:24
  • 10. Cryptocurrency laundering through one-glass trading.mp4
    04:02
  • 11. Cryptocurrency laundering through transfer to an intermediate smart contract.mp4
    02:49
  • 12. Cryptocurrency laundering through Referral system.mp4
    02:25
  • 13. Cryptocurrency laundering through lending platforms.mp4
    03:55
  • 14. Cryptocurrency laundering through sandwich attack.mp4
    06:12
  • 15. Cryptocurrency laundering through blockchain bridges.mp4
    04:30
  • 16. Cryptocurrency laundering through Tornado Cash and other ZKP algorithms.mp4
    06:30
  • 17. Cryptocurrency laundering through the Secret Network.mp4
    05:58
  • 18. Cryptocurrency laundering through arbitrage.mp4
    06:53
  • 19. Cryptocurrency laundering through NFTs.mp4
    05:09
  • 20. Cryptocurrency laundering through leverage trading.mp4
    03:24
  • 21. Cryptocurrency laundering through blockchain games.mp4
    04:38
  • 22. Cryptocurrency laundering through liquidations.mp4
    08:51
  • 23. Cryptocurrency laundering through prediction markets.mp4
    03:33
  • 24. Cryptocurrency laundering through the creation of a liquidity pool in a DEX.mp4
    03:27
  • 25. Cryptocurrency laundering through hidden liquidity flows between blockchains.mp4
    02:52
  • 26. Cryptocurrency laundering via MEV-Share.mp4
    06:50
  • 27. Cryptocurrency laundering through OTC platforms.mp4
    03:21
  • 28. Cryptocurrency laundering through decentralized insurance.mp4
    03:24
  • 29. Cryptocurrency laundering through decentralized auctions.mp4
    05:37
  • 1. Typical mistakes made when laundering cryptocurrency.mp4
    02:58
  • Description


    Learn to Navigate the Dark Web: Advanced Techniques for Tracing and Preventing Illicit Crypto Activities

    What You'll Learn?


    • Learn the basic concepts and features of Crypto Money Laundering, Anti Money Laundering (AML) and how Counter Financing of Terrorism works for crypto assets
    • Learn how to analyze all modern types of DeFi protocols from the point of view of cryptocurrency laundering
    • Use real-world examples to learn how to analyze fraudulent transactions, identify abnormal user behavior, and identify patterns of cryptocurrency laundering
    • You will understand how, using modern blockchain strategies, attackers earn cryptocurrency
    • You will understand what attackers do with cryptocurrency after they commit an attack and steal the crypto currency
    • Learn how to use modern blockchain forensics tools
    • Study how to determine whether a blockchain address is sanctioned or not
    • Consider the FATF and OFAC recommendations for working with high-risk crypto protocols and cryptocurrencies

    Who is this for?


  • Anyone who wants to explore modern ways of laundering cryptocurrencies using modern blockchain technologies such as smart contracts and DeFi protocols
  • Anyone who wants to learn how to react quickly and counter threats of terrorist financing and circumvention of sanctions
  • Anyone who likes to solve complex riddles and puzzles in the field of modern financial systems
  • Anyone who wants to find a hacker and return the stolen cryptocurrency
  • What You Need to Know?


  • To be interested in Anti-Money Laundering (AML), compliance, managing sanctions risks
  • It is desirable to have a general idea of how cryptocurrency works and blockchain transactions are performed
  • More details


    Description

    What if I told you that in the modern world there are whole business lines in which some people earn huge fortunes by making up such complex schemes that are not at all easy to analyze, and sometimes impossible.

    What pops into your head when you hear the word blockchain? A chain of linked blocks or maybe a cryptocurrency? But I can assure you, for some people, this word is associated with another: fraud.

    One of the main differences between classic hacking of a website and hacking of a smart contract is that in the case of the first one, the hacker still needs to sell the stolen information. With a smart contract, everything is easier, the attacker immediately receives a valuable convertible asset in the form of cryptocurrency, which can immediately be considered income. The difference is that the attacker needs to cover his tracks so that nothing can lead to him, despite the fact that the blockchain data is available to all Internet users.

    There are a lot of questions. And this course is a journey through the world of blockchain forensics, where we will act as an investigator and step by step look at the various ways and tricks that hackers use to legalize and launder cryptocurrency funds.

    Who this course is for:

    • Anyone who wants to explore modern ways of laundering cryptocurrencies using modern blockchain technologies such as smart contracts and DeFi protocols
    • Anyone who wants to learn how to react quickly and counter threats of terrorist financing and circumvention of sanctions
    • Anyone who likes to solve complex riddles and puzzles in the field of modern financial systems
    • Anyone who wants to find a hacker and return the stolen cryptocurrency

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Web3AML Group
    Web3AML Group
    Instructor's Courses
    Web3AML Group is an educational company focused on providing modern knowledge and practical knowledge in the field of AML/CFT in the cryptocurrency field.Our teachers have extensive experience in managing cryptocurrency risks, as well as expertise in the field of criminology. We are ready and want to share the results of the study with you.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 34
    • duration 2:33:53
    • Release Date 2024/03/01