Companies Home Search Profile

IFCI Expert Cybercrime Investigator's Course

Focused View

Brian Hussey

16:03:38

111 View
  • 001 The World of Cybercrime Investigation.mp4
    17:14
  • 002 Subfields of Computer Forensics.mp4
    13:13
  • 003 Roles and Responsibilities of the Cybercrime Investigator.mp4
    13:30
  • 004 Computer Forensic Tools and Testing.mp4
    10:00
  • 005 Sources of Digital Evidence.mp4
    08:22
  • 006 Home Computer Setup for IFCI Labs.mp4
    06:31
    • Forensic Image FINAL
    • desktop.zip
    • vader home computer.zip
    • vader home computer.001.zip
      IFCI CCICF Lab 1 - Hashing
    • Lab 1 - Hashing.pdf
    • desktop.zip
    • hashcalc setup.zip
    • hxd setup.zip
      IFCI CCICF Lab 2 - Forensic Acquisition
    • Lab 2 - Forensic Imaging.pdf
    • accessdata ftk imager 3.1.4.zip
    • desktop.zip
    • dumpit.zip
      IFCI CCICF Lab 3 - Deleted File Recovery
    • Lab 3 - Deleted File Recovery.pdf
    • desktop.zip
    • suspect floppy image.zip
    • suspect floppy image - copy.zip
      IFCI CCICF Lab 4 - Email Analysis
    • Lab 4- Email analysis.pdf
    • desktop.zip
      • MailView
      • desktop.zip
      • localization.zip
      • mailview.zip
      • mailviewer.cs.zip
      • mailviewer.de.zip
      • mailviewer.el.zip
      • mailviewer.en.zip
      • mailviewer.es.zip
      • mailviewer.fr.zip
      • mailviewer.hu.zip
      • mailviewer.it.zip
      • mailviewer.nl.zip
      • mailviewer.pl.zip
      • mailviewer.ru.zip
      • mailviewer.sk.zip
      • mailviewer.sv.zip
      • mailviewer.tr.zip
      • mailviewer.zh.zip
      • mailviewer.pt br.zip
      • mailviewer.zh-tw.zip
      IFCI CCICF Lab 5 - Internet Activity Analysis
    • Lab 5- Internet Activity Analysis.pdf
    • desktop.zip
      • browsinghistoryview
      • browsinghistoryview.zip
      • desktop.zip
      • readme.zip
        browsinghistoryview-x64
      • browsinghistoryview.zip
      • desktop.zip
      • readme.zip
      IFCI CCICF Lab 6 - Recycle Bin Analysis
    • Lab 6 - Recycle Bin Analysis.pdf
    • desktop.zip
      • WFA
      • desktop.zip
      • wfa.zip
      IFCI CCICF Lab 7 - Link File Analysis
    • IFCI CCICF Lab 7 - Link File Analysis.pdf
    • desktop.zip
      • WFA
      • desktop.zip
      • wfa.zip
      IFCI CCICF Lab 8 - Prefetch File Analysis
    • Lab 8 - Prefetch File Analysis.pdf
    • desktop.zip
    • winprefetchview.zip
      IFCI CCICF Lab 9 - Signature Analysis
    • IFCI CCIF Lab 9 - Signature Analysis.docx
    • Lab 9 - Signature Analysis.pdf
    • Wikipedia List of file signatures.pdf
    • desktop.zip
    • hxd setup.zip
      IFCI CCICF Lab 10 - Exif Data Analysis
    • IFCI CCIF Lab 10 - Exif Data Analysis.docx
    • Lab 10 - Exif Data Analysis.pdf
    • desktop.zip
    • exifread.zip
      IFCI CCICF Lab 11 - Event Log Analysis
    • Lab 11 - Event Log Analysis.pdf
    • desktop.zip
      • elex
      • desktop.zip
      • elex setup.zip
      • file id.zip
      • whatsnew.zip
      IFCI CCICF Lab 12 - Registry Analysis
    • CCICF Lab 12 - Registry Analysis.docx
    • Lab 12 - Registry Analysis.pdf
    • desktop.zip
      • Registry Browser 3
      • desktop.zip
      • registrybrowser x86 v3-11a.zip
      IFCI CCICF Lab 13 - Domain Investigation
    • Lab 13 - Domain investigations.pdf
    • desktop.zip
      IFCI CCICF Lab 14 - Volatile Memory Analysis
    • Lab 14 - Volatile Memory Analysis.pdf
    • desktop.zip
    • silentbanker.zip
    • vader home computer.zip
    • volatility-2.3.1.standalone.zip
      IFCI CCICF Lab 15 - Dynamic Malware Analysis --DEMO
    • Lab 15 - Malware Analysis Demo.pdf
    • desktop.zip
  • 001 Incident Response Triage and Forensic Acquisitons.mp4
    15:26
  • 002 Hashes - Digital Fingerprints.mp4
    11:53
  • 003 Lab1 - Hashing.mp4
    20:22
  • 004 Incident Responders Forensic Acquisition Process.mp4
    16:54
  • 005 Different Approaches to Forensic Acquisition.mp4
    09:51
  • 006 Volatile Memory Acquisition.mp4
    12:01
  • 007 Lab2 - Forensic Acquisition Lab.mp4
    11:24
  • 001 Introduction to File Systems and Operating Systems.mp4
    07:42
  • 002 Data Structures.mp4
    22:37
  • 003 Slack Space and Deleted Files.mp4
    10:02
  • 004 File System Limitations.mp4
    04:26
  • 005 FAT File Systems.mp4
    03:35
  • 006 NTFS File Systems.mp4
    04:06
  • 007 File Carving and File Fragmentation.mp4
    05:41
  • 008 Lab 3 Deleted File Recovery.mp4
    14:54
  • 001 Email Analysis.mp4
    07:19
  • 002 Host and Web Based Email Extraction.mp4
    07:09
  • 003 Email Header Analyisis and Base64 Encoding.mp4
    07:02
  • 004 LAB 4 - Email Analysis.mp4
    20:22
  • 005 Internet Activity Analysis Introduction.mp4
    03:19
  • 006 Chrome and Firefox Analysis.mp4
    06:00
  • 007 Internet Explorer Analysis.mp4
    05:52
  • 008 Cookies, Cache, and IE Artifacts.mp4
    06:16
  • 009 URL Obfuscation.mp4
    07:09
  • 010 LAB 5 - Internet Activity Analysis.mp4
    15:02
  • 001 Timeline Analysis.mp4
    12:59
  • 002 Time Zone Issues.mp4
    05:16
  • 003 Time Stamps.mp4
    08:13
  • 004 Non-Standard Timestamps and Timeline Antiforensics.mp4
    07:14
  • 005 MAC Time Triangulation.mp4
    05:26
  • 006 User Attribution and Analysis.mp4
    07:40
  • 007 Recycle Bin Analysis.mp4
    08:10
  • 008 Lab 6 - Recycle Bin Analysis.mp4
    13:44
  • 009 Link File Analysis.mp4
    05:51
  • 010 Other Locations of Interest.mp4
    02:54
  • 011 Lab 7 - Link File Analysis.mp4
    10:52
  • 001 Thumbs.db and Thumbcache Analysis.mp4
    05:38
  • 002 Prefetch File Analysis.mp4
    07:01
  • 003 Lab 8 - Prefetch File Analysis.mp4
    16:08
  • 004 Persistent RAM Files and System Restore Functions.mp4
    08:28
  • 005 File Signature Analysis.mp4
    07:03
  • 006 Lab 9 - File Signature Analysis.mp4
    10:10
  • 007 Metadata Analysis.mp4
    08:13
  • 008 Exif Data Analysis.mp4
    10:13
  • 009 Lab 10 - Exif Data Analysis.mp4
    13:53
  • 001 Windows Log Analysis.mp4
    04:58
  • 002 System and Application Event Log Analysis.mp4
    05:27
  • 003 Security Event Log Analysis.mp4
    05:47
  • 004 Dr Watson Logs.mp4
    03:19
  • 005 Lab 11 - Event Log Analysis.mp4
    10:11
  • 006 Introduction to the Windows Registry.mp4
    05:29
  • 007 Registry Analysis -USB Devices.mp4
    03:52
  • 008 Registry Analysis - NTUser.dat - Part 1.mp4
    07:58
  • 009 Registry Analysis - NTUser.dat - Part 2.mp4
    08:25
  • 010 Registry Analysis - Autostarts.mp4
    06:03
  • 011 Lab 12 - Registry Analysis.mp4
    12:14
  • 001 The Hacking Process.mp4
    12:13
  • 002 Hacker Motivations.mp4
    15:00
  • 003 Hacker Strategies.mp4
    11:04
  • 004 Botnet Investigations.mp4
    07:01
  • 005 Drive-by Downloads.mp4
    05:07
  • 006 Malware Propagation.mp4
    06:36
  • 007 Polymorphism and Packers.mp4
    08:03
  • 008 Social Engineering.mp4
    10:15
  • 009 Rootkits.mp4
    06:05
  • 001 Network Data Evidence and IP Addressing.mp4
    06:50
  • 002 TCP and UDP Communication Protocols.mp4
    04:52
  • 003 Network Communication and Ports.mp4
    04:58
  • 004 HTTP Analysis and DNS Poisioning.mp4
    05:06
  • 005 Network Scanners and Sniffers.mp4
    02:55
  • 001 The Blurred Lines Between Cybercrime, Cyberwar, and Cyberespionage.mp4
    08:03
  • 002 The Intersection of Cybercrime and Cyberwar.mp4
    08:02
  • 003 Russian Organized Cybercrime.mp4
    15:45
  • 004 Supply Chain Interdiction.mp4
    04:45
  • 005 Criminal Domain Investigations.mp4
    06:55
  • 006 Domain and IP Address Investigation Tools.mp4
    08:30
  • 007 Lab 13 - Criminal Domain Investigations.mp4
    21:00
  • 008 Stuxnet.mp4
    10:14
  • 009 Point of Sale Server Attacks.mp4
    10:31
  • 010 Point of Sale Server- Malware.mp4
    08:28
  • 011 Point of Sale Server- Exfiltration.mp4
    03:46
  • 012 Point of Sale Server- Advanced Investigative Techniques.mp4
    07:14
  • 001 Volatile Memory Analysis Introduction.mp4
    09:21
  • 002 Volatility Introduction.mp4
    15:33
  • 003 Analyzing ZeuS Malware with Volatility.mp4
    09:09
  • 004 Malware Analysis Using Volatility - Part 1.mp4
    05:38
  • 005 Malware Analysis Using Volatility - Part 2.mp4
    08:06
  • 006 Volatility - Advanced Capabilities.mp4
    04:43
  • 007 Lab 14 1 Volatile Memory Analysis of IRC Malware and VNC Attack.mp4
    16:14
  • 008 Lab 14 2 Volatile Memory Analysis of SilentBanker Malware.mp4
    10:53
  • 001 Introduction to Dynamic Malware Analysis.mp4
    07:34
  • 002 Virtual Malware Analysis Environment Setup - Part 1.mp4
    05:15
  • 003 Virtual Malware Analysis Environment Setup - Part 2.mp4
    04:50
  • 004 IRC Malware Analysis - Part 1.mp4
    06:16
  • 005 IRC Malware Analysis - Part 2.mp4
    02:26
  • 006 Lab 15 - Basic Malware Analysis - IRC Bot.mp4
    15:12
  • 007 Lab 16-1 Advanced Malware Analysis - Rootkits.mp4
    08:12
  • 008 Lab 16-2 Advanced Malware Analysis - Rootkits.mp4
    18:13
  • 009 Lab 16-3 Advanced Malware Analyis - Rootkits.mp4
    08:50
  • 010 Lab 16-4 Advanced Malware Analysis - Rootkits.mp4
    06:24
  • 001 IFCI Course Review.mp4
    07:28
  • Description


    Protect your network - Put cybercriminals in jail. Learn computer forensics, malware analysis and hacker investigations.

    What You'll Learn?


    • Respond to cybercrime incidents, forensic acquisition, volatile memory acquisition, and live system analysis.
    • Conduct full system computer forensic investigation, recover deleted files, carve data structures from unallocated space.
    • Identify, extract, and analyze malware.
    • Analyze data breach incidents to determine if and what data was stolen.
    • Conduct volatile memory analysis using Volatility.
    • Learn the history of cybercrime, how it intertwines with organized crime, is monetized, cyber espionage, cyber terror and nation state sponsored attacks.
    • Learn hacker tactics, techniques, and procedures - and how to defend against them.
    • Learn techniques to pursue cybercriminals across the globe.
    • Testify as an expert witness against computer criminals.
    • Take the exam and become a professional IFCI Certified Cybercrime Investigator (IFCI-CCI)

    Who is this for?


  • Technical personnel tasked with, or interested in network security, computer forensics, or malware analysis.
  • Law enforcement officers, federal agents, and intelligence analysts tasked with cyber operations will all benefit from this course.
  • This is a beginner's course, it is also very useful for hobbyists, reporters, and any interested parties.
  • While this is a beginner's course, the material gets more and more complex as the class continues. It is in-depth, detailed, and hands-on and requires maximum effort for maximum benefit - therefore it is not recommended for casual observers not interested in putting forth the effort required to learn the material.
  • More details


    Description

    What is the IFCI Cybercrime Investigator's Course?

    IFCI’s flagship training program is the IFCI-CCI (Cybercrime Investigator) Training course. The IFCI-CCI teaches students the skills necessary to respond to all kinds of cybercrime incidents, from initial incident response and digital crime scene evidence acquisition to advanced forensic analysis and tracking International cybercriminals across the Internet.

    The main goal for this course is to empower the nation’s cyber investigators with the knowledge, skills and abilities to undertake and successfully carry out their own investigations. This course is the first step for investigators to turn the tables on cyber criminals who are fleecing legitimate economies worldwide of billions of dollars every year.

    Some Course highlights include:

    • 15 hands-on labs - devised of real world scenarios
    • Analysis of Windows forensic artifacts
    • Volatile memory analysis
    • Network intrusion investigations
    • Internet activity and email analysis
    • Network traffic data analysis
    • International cybercriminal profiling
    • Attack vector identification
    • Dynamic malware analysis

    Who Should Take this course?

    Anybody whose job requires them to respond to cyber incidents, or anyone with an interest in cybercrime investigation, should take the IFCI-CCI training course. This course will help you by providing fast solutions to the following emergency situations:

    Corporate Risk/Security - Intellectual Property Theft Case: Your Research and Development Director quits and goes to work for a competitor.

    • Can you determine if he copied your company’s secrets to a USB drive to take with him?

    Police Investigations - Kidnapping Case: A child is taken from his home at night and the family receives an email with a proof-of-life picture and ransom demand.

    • Can you extract IP addresses from the email headers to track the offender back to his location, or extract lat/long coordinates from the picture’s EXIF data to determine the exact location the picture was taken?

    IT Security Team - Rogue Malware Case: You discover malware on an internal corporate computer but you don’t know what it does or why it’s there.

    • Can you analyze the malware, determine its capabilities, identify its target data, and destroy its data exfiltration file before your corporate proprietary information is lost?

    Federal Cyber Agent - Botnet Investigation Case: You’ve tracked botnet malware back to a specific set of command and control servers, but what’s the next step?

    • Can you determine the server’s physical location in the world and research current and historical whois information? Are you able to research other malicious domains associated with the same IP address and track Command and Control proxy servers back to specific malicious actors?

    E-Discovery Analyst - File access case: You’ve recovered and indexed thousands of PDF files on a computer. One was flagged as key to the case and you are asked if the computer owner knew of and accessed this file.

    • Can you examine the Windows registry and link files to determine the exact time and date that specific users accessed individual files?


    Why take this course?

    Cybercrime is epidemic. The headlines declare it daily:

    • 2015 - SONY is devastated by an attack that destroys its internal systems, steals terabytes of private data, posts unreleased movies on Internet torrent sites, and humiliates corporate executives. The cost to corporate image and revenue stream is uncountable.
    • 2014 - Home Depot is hacked, losing an estimated 55 million credit cards to the cybercrime underground.
    • 2013 - Russian Hackers steal 40 million credit cards from Target, resulting in approx $1 billion in losses to the company.
    • 2012 - The Shamoon virus destroys nearly 30,000 Saudi Aramco Computers, temporarily shutting down one of the world’s largest corporations.
    • 2011 - SONY data breach lost personal details and payment information for approximately 77 million customers, resulting in massive monetary loss and the temporary closure of the PlayStation Gaming Network.

    The corporations victimized in these situations were unprepared to respond to the attacks causing delayed investigations and reduced information flow to decision-making executives. Eventually, they contracted out the investigations to high-priced consultants, whose investigative results were often too little, too late.

    IFCI-CCI’s mission is to provide our students the knowledge and skills necessary to respond to network attacks immediately, analyze the evidence, produce actionable cyber-intelligence, and implement it to shore up security vulnerabilities before they become massive breaches like those mentioned above.

    There is a dearth of quality training in computer forensics, even less for hacker and malware focused investigations, and almost nothing that is available in a convenient online format that can be studied from the comfort of your own home, and fit to your own schedule. IFCI fills this void by providing the finest cybercrime investigation training in the world, created and delivered by some of the world’s foremost experts in their field, and streamed directly to any Internet-connected device you choose to employ.

    Who this course is for:

    • Technical personnel tasked with, or interested in network security, computer forensics, or malware analysis.
    • Law enforcement officers, federal agents, and intelligence analysts tasked with cyber operations will all benefit from this course.
    • This is a beginner's course, it is also very useful for hobbyists, reporters, and any interested parties.
    • While this is a beginner's course, the material gets more and more complex as the class continues. It is in-depth, detailed, and hands-on and requires maximum effort for maximum benefit - therefore it is not recommended for casual observers not interested in putting forth the effort required to learn the material.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Brian Hussey
    Brian Hussey
    Instructor's Courses
    Brian Hussey, EnCE, GREM, CCE, PMP, Q/EH, Brian Hussey leads an elite team of Cybercrime Investigators working within US Federal Law Enforcement, His team has been responsible for investigating many of the most dangerous cyber attacks ever to threaten the United States and the fortune 500 companies that form its economic backbone. His team has pursued cyber criminals throughout the world and brought them to justice. Mr. Hussey's digital forensic analysis and testimony has resulted in Russian Point of Sale hackers, child predators, and malware authors from across the globe going to jail. He is a recognized expert in the fields of computer forensics, malware analysis, memory analysis, and cyber threat intelligence. Mr. Hussey has also designed network intrusion forensics and malware analysis training for US Federal law enforcement and our International partners. He has represented the United States by teaching these topics to the national police in countries such as: Ukraine, Japan, Latvia, Estonia, Moldova, Germany, Nigeria, India, and many others. In 2011, Mr. Hussey decided the advanced cybercrime investigation techniques used by his team should be available outside of select Government circles and he began teaching at George Mason University in the Master of Computer Forensics program. In 2014, he founded IFCI to provide this same training to cybercrime fighters throughout the world. Mr. Hussey firmly believes that International cybercrime investigators working together, and armed with the proper training, can turn the tables on the relentless scourge of cyber crime.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 107
    • duration 16:03:38
    • Release Date 2023/04/26

    Courses related to Cyber Security

    Courses related to Computer Forensics