IFCI Expert Cybercrime Investigator's Course
Brian Hussey
16:03:38
- Forensic Image FINAL
- desktop.zip
- vader home computer.zip
- vader home computer.001.zip
- IFCI CCICF Lab 1 - Hashing
- Lab 1 - Hashing.pdf
- desktop.zip
- hashcalc setup.zip
- hxd setup.zip
- IFCI CCICF Lab 2 - Forensic Acquisition
- Lab 2 - Forensic Imaging.pdf
- accessdata ftk imager 3.1.4.zip
- desktop.zip
- dumpit.zip
- IFCI CCICF Lab 3 - Deleted File Recovery
- Lab 3 - Deleted File Recovery.pdf
- desktop.zip
- suspect floppy image.zip
- suspect floppy image - copy.zip
- IFCI CCICF Lab 4 - Email Analysis
- Lab 4- Email analysis.pdf
- desktop.zip
- desktop.zip
- localization.zip
- mailview.zip
- mailviewer.cs.zip
- mailviewer.de.zip
- mailviewer.el.zip
- mailviewer.en.zip
- mailviewer.es.zip
- mailviewer.fr.zip
- mailviewer.hu.zip
- mailviewer.it.zip
- mailviewer.nl.zip
- mailviewer.pl.zip
- mailviewer.ru.zip
- mailviewer.sk.zip
- mailviewer.sv.zip
- mailviewer.tr.zip
- mailviewer.zh.zip
- mailviewer.pt br.zip
- mailviewer.zh-tw.zip
- MailView
- IFCI CCICF Lab 5 - Internet Activity Analysis
- Lab 5- Internet Activity Analysis.pdf
- desktop.zip
- browsinghistoryview.zip
- desktop.zip
- readme.zip
- browsinghistoryview.zip
- desktop.zip
- readme.zip
- browsinghistoryview
- browsinghistoryview-x64
- IFCI CCICF Lab 6 - Recycle Bin Analysis
- Lab 6 - Recycle Bin Analysis.pdf
- desktop.zip
- desktop.zip
- wfa.zip
- WFA
- IFCI CCICF Lab 7 - Link File Analysis
- IFCI CCICF Lab 7 - Link File Analysis.pdf
- desktop.zip
- desktop.zip
- wfa.zip
- WFA
- IFCI CCICF Lab 8 - Prefetch File Analysis
- Lab 8 - Prefetch File Analysis.pdf
- desktop.zip
- winprefetchview.zip
- IFCI CCICF Lab 9 - Signature Analysis
- IFCI CCIF Lab 9 - Signature Analysis.docx
- Lab 9 - Signature Analysis.pdf
- Wikipedia List of file signatures.pdf
- desktop.zip
- hxd setup.zip
- IFCI CCICF Lab 10 - Exif Data Analysis
- IFCI CCIF Lab 10 - Exif Data Analysis.docx
- Lab 10 - Exif Data Analysis.pdf
- desktop.zip
- exifread.zip
- IFCI CCICF Lab 11 - Event Log Analysis
- Lab 11 - Event Log Analysis.pdf
- desktop.zip
- desktop.zip
- elex setup.zip
- file id.zip
- whatsnew.zip
- elex
- IFCI CCICF Lab 12 - Registry Analysis
- CCICF Lab 12 - Registry Analysis.docx
- Lab 12 - Registry Analysis.pdf
- desktop.zip
- desktop.zip
- registrybrowser x86 v3-11a.zip
- Registry Browser 3
- IFCI CCICF Lab 13 - Domain Investigation
- Lab 13 - Domain investigations.pdf
- desktop.zip
- IFCI CCICF Lab 14 - Volatile Memory Analysis
- Lab 14 - Volatile Memory Analysis.pdf
- desktop.zip
- silentbanker.zip
- vader home computer.zip
- volatility-2.3.1.standalone.zip
- IFCI CCICF Lab 15 - Dynamic Malware Analysis --DEMO
- Lab 15 - Malware Analysis Demo.pdf
- desktop.zip
Description
Protect your network - Put cybercriminals in jail. Learn computer forensics, malware analysis and hacker investigations.
What You'll Learn?
- Respond to cybercrime incidents, forensic acquisition, volatile memory acquisition, and live system analysis.
- Conduct full system computer forensic investigation, recover deleted files, carve data structures from unallocated space.
- Identify, extract, and analyze malware.
- Analyze data breach incidents to determine if and what data was stolen.
- Conduct volatile memory analysis using Volatility.
- Learn the history of cybercrime, how it intertwines with organized crime, is monetized, cyber espionage, cyber terror and nation state sponsored attacks.
- Learn hacker tactics, techniques, and procedures - and how to defend against them.
- Learn techniques to pursue cybercriminals across the globe.
- Testify as an expert witness against computer criminals.
- Take the exam and become a professional IFCI Certified Cybercrime Investigator (IFCI-CCI)
Who is this for?
More details
Description What is the IFCI Cybercrime Investigator's Course?
IFCIâs flagship training program is the IFCI-CCI (Cybercrime Investigator) Training course. The IFCI-CCI teaches students the skills necessary to respond to all kinds of cybercrime incidents, from initial incident response and digital crime scene evidence acquisition to advanced forensic analysis and tracking International cybercriminals across the Internet.
The main goal for this course is to empower the nationâs cyber investigators with the knowledge, skills and abilities to undertake and successfully carry out their own investigations. This course is the first step for investigators to turn the tables on cyber criminals who are fleecing legitimate economies worldwide of billions of dollars every year.
Some Course highlights include:
- 15 hands-on labs - devised of real world scenarios
- Analysis of Windows forensic artifacts
- Volatile memory analysis
- Network intrusion investigations
- Internet activity and email analysis
- Network traffic data analysis
- International cybercriminal profiling
- Attack vector identification
- Dynamic malware analysis
Who Should Take this course?
Anybody whose job requires them to respond to cyber incidents, or anyone with an interest in cybercrime investigation, should take the IFCI-CCI training course. This course will help you by providing fast solutions to the following emergency situations:
Corporate Risk/Security - Intellectual Property Theft Case: Your Research and Development Director quits and goes to work for a competitor.
- Can you determine if he copied your companyâs secrets to a USB drive to take with him?
Police Investigations - Kidnapping Case: A child is taken from his home at night and the family receives an email with a proof-of-life picture and ransom demand.
- Can you extract IP addresses from the email headers to track the offender back to his location, or extract lat/long coordinates from the pictureâs EXIF data to determine the exact location the picture was taken?
IT Security Team - Rogue Malware Case: You discover malware on an internal corporate computer but you donât know what it does or why itâs there.
- Can you analyze the malware, determine its capabilities, identify its target data, and destroy its data exfiltration file before your corporate proprietary information is lost?
Federal Cyber Agent - Botnet Investigation Case: Youâve tracked botnet malware back to a specific set of command and control servers, but whatâs the next step?
- Can you determine the serverâs physical location in the world and research current and historical whois information? Are you able to research other malicious domains associated with the same IP address and track Command and Control proxy servers back to specific malicious actors?
E-Discovery Analyst - File access case: Youâve recovered and indexed thousands of PDF files on a computer. One was flagged as key to the case and you are asked if the computer owner knew of and accessed this file.
- Can you examine the Windows registry and link files to determine the exact time and date that specific users accessed individual files?
Why take this course?
Cybercrime is epidemic. The headlines declare it daily:
- 2015 - SONY is devastated by an attack that destroys its internal systems, steals terabytes of private data, posts unreleased movies on Internet torrent sites, and humiliates corporate executives. The cost to corporate image and revenue stream is uncountable.
- 2014 - Home Depot is hacked, losing an estimated 55 million credit cards to the cybercrime underground.
- 2013 - Russian Hackers steal 40 million credit cards from Target, resulting in approx $1 billion in losses to the company.
- 2012 - The Shamoon virus destroys nearly 30,000 Saudi Aramco Computers, temporarily shutting down one of the worldâs largest corporations.
- 2011 - SONY data breach lost personal details and payment information for approximately 77 million customers, resulting in massive monetary loss and the temporary closure of the PlayStation Gaming Network.
The corporations victimized in these situations were unprepared to respond to the attacks causing delayed investigations and reduced information flow to decision-making executives. Eventually, they contracted out the investigations to high-priced consultants, whose investigative results were often too little, too late.
IFCI-CCIâs mission is to provide our students the knowledge and skills necessary to respond to network attacks immediately, analyze the evidence, produce actionable cyber-intelligence, and implement it to shore up security vulnerabilities before they become massive breaches like those mentioned above.
There is a dearth of quality training in computer forensics, even less for hacker and malware focused investigations, and almost nothing that is available in a convenient online format that can be studied from the comfort of your own home, and fit to your own schedule. IFCI fills this void by providing the finest cybercrime investigation training in the world, created and delivered by some of the worldâs foremost experts in their field, and streamed directly to any Internet-connected device you choose to employ.
Who this course is for:
- Technical personnel tasked with, or interested in network security, computer forensics, or malware analysis.
- Law enforcement officers, federal agents, and intelligence analysts tasked with cyber operations will all benefit from this course.
- This is a beginner's course, it is also very useful for hobbyists, reporters, and any interested parties.
- While this is a beginner's course, the material gets more and more complex as the class continues. It is in-depth, detailed, and hands-on and requires maximum effort for maximum benefit - therefore it is not recommended for casual observers not interested in putting forth the effort required to learn the material.
What is the IFCI Cybercrime Investigator's Course?
IFCIâs flagship training program is the IFCI-CCI (Cybercrime Investigator) Training course. The IFCI-CCI teaches students the skills necessary to respond to all kinds of cybercrime incidents, from initial incident response and digital crime scene evidence acquisition to advanced forensic analysis and tracking International cybercriminals across the Internet.
The main goal for this course is to empower the nationâs cyber investigators with the knowledge, skills and abilities to undertake and successfully carry out their own investigations. This course is the first step for investigators to turn the tables on cyber criminals who are fleecing legitimate economies worldwide of billions of dollars every year.
Some Course highlights include:
- 15 hands-on labs - devised of real world scenarios
- Analysis of Windows forensic artifacts
- Volatile memory analysis
- Network intrusion investigations
- Internet activity and email analysis
- Network traffic data analysis
- International cybercriminal profiling
- Attack vector identification
- Dynamic malware analysis
Who Should Take this course?
Anybody whose job requires them to respond to cyber incidents, or anyone with an interest in cybercrime investigation, should take the IFCI-CCI training course. This course will help you by providing fast solutions to the following emergency situations:
Corporate Risk/Security - Intellectual Property Theft Case: Your Research and Development Director quits and goes to work for a competitor.
- Can you determine if he copied your companyâs secrets to a USB drive to take with him?
Police Investigations - Kidnapping Case: A child is taken from his home at night and the family receives an email with a proof-of-life picture and ransom demand.
- Can you extract IP addresses from the email headers to track the offender back to his location, or extract lat/long coordinates from the pictureâs EXIF data to determine the exact location the picture was taken?
IT Security Team - Rogue Malware Case: You discover malware on an internal corporate computer but you donât know what it does or why itâs there.
- Can you analyze the malware, determine its capabilities, identify its target data, and destroy its data exfiltration file before your corporate proprietary information is lost?
Federal Cyber Agent - Botnet Investigation Case: Youâve tracked botnet malware back to a specific set of command and control servers, but whatâs the next step?
- Can you determine the serverâs physical location in the world and research current and historical whois information? Are you able to research other malicious domains associated with the same IP address and track Command and Control proxy servers back to specific malicious actors?
E-Discovery Analyst - File access case: Youâve recovered and indexed thousands of PDF files on a computer. One was flagged as key to the case and you are asked if the computer owner knew of and accessed this file.
- Can you examine the Windows registry and link files to determine the exact time and date that specific users accessed individual files?
Why take this course?
Cybercrime is epidemic. The headlines declare it daily:
- 2015 - SONY is devastated by an attack that destroys its internal systems, steals terabytes of private data, posts unreleased movies on Internet torrent sites, and humiliates corporate executives. The cost to corporate image and revenue stream is uncountable.
- 2014 - Home Depot is hacked, losing an estimated 55 million credit cards to the cybercrime underground.
- 2013 - Russian Hackers steal 40 million credit cards from Target, resulting in approx $1 billion in losses to the company.
- 2012 - The Shamoon virus destroys nearly 30,000 Saudi Aramco Computers, temporarily shutting down one of the worldâs largest corporations.
- 2011 - SONY data breach lost personal details and payment information for approximately 77 million customers, resulting in massive monetary loss and the temporary closure of the PlayStation Gaming Network.
The corporations victimized in these situations were unprepared to respond to the attacks causing delayed investigations and reduced information flow to decision-making executives. Eventually, they contracted out the investigations to high-priced consultants, whose investigative results were often too little, too late.
IFCI-CCIâs mission is to provide our students the knowledge and skills necessary to respond to network attacks immediately, analyze the evidence, produce actionable cyber-intelligence, and implement it to shore up security vulnerabilities before they become massive breaches like those mentioned above.
There is a dearth of quality training in computer forensics, even less for hacker and malware focused investigations, and almost nothing that is available in a convenient online format that can be studied from the comfort of your own home, and fit to your own schedule. IFCI fills this void by providing the finest cybercrime investigation training in the world, created and delivered by some of the worldâs foremost experts in their field, and streamed directly to any Internet-connected device you choose to employ.
Who this course is for:
- Technical personnel tasked with, or interested in network security, computer forensics, or malware analysis.
- Law enforcement officers, federal agents, and intelligence analysts tasked with cyber operations will all benefit from this course.
- This is a beginner's course, it is also very useful for hobbyists, reporters, and any interested parties.
- While this is a beginner's course, the material gets more and more complex as the class continues. It is in-depth, detailed, and hands-on and requires maximum effort for maximum benefit - therefore it is not recommended for casual observers not interested in putting forth the effort required to learn the material.
User Reviews
Rating
Brian Hussey
Instructor's Courses
Udemy
View courses Udemy- language english
- Training sessions 107
- duration 16:03:38
- Release Date 2023/04/26