arrow_back
Complete Course Preview
Module 1: Cyber Criminology
Criminological Theories
Introduction To Cyberspace
Frauds, Victims and Vectors
Cyber Threats and Identification
Module 1 NOTES
Module 2: Attacking Methodologies
Cyber Focused Crimes - Financial
Cyber Enabled Crime - Harrasment
Graph Generation
Finally Attacking the Attacker
Module 2 NOTES
Module 3: Social Engineering and Attacks
Understanding Methodlogies
Social Exploitation and Tools
Human Manipulation Tricks
Online Radicalization
Self Prevention and Protection
Module 3 NOTES
Module 4: Open Source Intelligence
Overview of OSINT
Gathering all Details
Facebook and Instagram Recon
Linkedin and Twitter OSINT
Looking Profiles Anonymously
Module 4 NOTES
Module 5: Dark Net and Deep Web Investigations
Deep and Dark Web Crawling
Onion Links advanced Vulnerability Scanning
Software Setup and data extraction
Deanonymizing Hidden Services
TOR Exonerator IP Reverse
Bypassing TOR Censorship
Module 5 NOTES
Module 6: Crypto Currency Investigations
Bitcoin Investigations via Drknet
Fetching Cryptocurrency Address Details
Address Validation and Accounts Balancing
Common Links between Malicious Transactions
Wallet Explorer and Chain Analysis
Passive DNS and Transactional IP Fetch
Module 6 NOTES
Module 7: Steganography and Miscellaneous Hacks
Cryptography and Various Encryptions
Scripting Challenges and Decryption
Steganography and Tools
Image Forensics and Geodata
Manual Embedding Data and Files
Module 8: Cyber Law and Policing
Overview and Need of Laws
Contravention Vs Crime
Policing Services in India
Required Cyber crime Laws
Conclusion on Cyber Investigations
Module 9: Bonus Investigations
Automating Everything
What are Botnets and Crimes
Crimes Related to Cloud
Private Investigation Starter
Bug Hunting class
Preview - Certified Cyber Criminologist (LIVE)
Discuss (
0
)
navigate_before
Previous
Next
navigate_next