Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Meditation Personal Transformation Life Purpose Coaching Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee

This course includes:

  • 16.5 hours on-demand video
  • 1 downloadable resource
  • Full lifetime access
  • Access on mobile and TV
IT & Software Network & Security Cyber Security

IFCI Expert Cybercrime Investigator's Course

Protect your network - Put cybercriminals in jail. Learn computer forensics, malware analysis and hacker investigations.
Bestseller
Rating: 4.7 out of 54.7 (304 ratings)
1,661 students
Created by Brian Hussey
Last updated 1/2015
English
English [Auto], Portuguese [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Respond to cybercrime incidents, forensic acquisition, volatile memory acquisition, and live system analysis.
  • Conduct full system computer forensic investigation, recover deleted files, carve data structures from unallocated space.
  • Identify, extract, and analyze malware.
  • Analyze data breach incidents to determine if and what data was stolen.
  • Conduct volatile memory analysis using Volatility.
  • Learn the history of cybercrime and how it intertwines with international organized crime, how it is monetized, and how it connects to cyber espionage, cyber terror and nation state sponsored attacks.
  • Learn hacker tactics, techniques, and procedures - and how to defend against them.
  • Learn techniques to pursue cybercriminals across the globe.
  • Testify as an expert witness against computer criminals.
  • Take the exam and become a professional IFCI Certified Cybercrime Investigator (IFCI-CCI)
Curated for the Udemy for Business collection

Requirements

  • This course is for computer forensics beginners who are already skilled in general usage of Windows computers.

Description

What is the IFCI Cybercrime Investigator's Course?

IFCI’s flagship training program is the IFCI-CCI (Cybercrime Investigator) Training course. The IFCI-CCI teaches students the skills necessary to respond to all kinds of cybercrime incidents, from initial incident response and digital crime scene evidence acquisition to advanced forensic analysis and tracking International cybercriminals across the Internet.

The main goal for this course is to empower the nation’s cyber investigators with the knowledge, skills and abilities to undertake and successfully carry out their own investigations. This course is the first step for investigators to turn the tables on cyber criminals who are fleecing legitimate economies worldwide of billions of dollars every year.

Some Course highlights include:

  • 15 hands-on labs - devised of real world scenarios
  • Analysis of Windows forensic artifacts
  • Volatile memory analysis
  • Network intrusion investigations
  • Internet activity and email analysis
  • Network traffic data analysis
  • International cybercriminal profiling
  • Attack vector identification
  • Dynamic malware analysis

Who Should Take this course?

Anybody whose job requires them to respond to cyber incidents, or anyone with an interest in cybercrime investigation, should take the IFCI-CCI training course. This course will help you by providing fast solutions to the following emergency situations:

Corporate Risk/Security - Intellectual Property Theft Case: Your Research and Development Director quits and goes to work for a competitor.

  • Can you determine if he copied your company’s secrets to a USB drive to take with him?

Police Investigations - Kidnapping Case: A child is taken from his home at night and the family receives an email with a proof-of-life picture and ransom demand.

  • Can you extract IP addresses from the email headers to track the offender back to his location, or extract lat/long coordinates from the picture’s EXIF data to determine the exact location the picture was taken?

IT Security Team - Rogue Malware Case: You discover malware on an internal corporate computer but you don’t know what it does or why it’s there.

  • Can you analyze the malware, determine its capabilities, identify its target data, and destroy its data exfiltration file before your corporate proprietary information is lost?

Federal Cyber Agent - Botnet Investigation Case: You’ve tracked botnet malware back to a specific set of command and control servers, but what’s the next step?

  • Can you determine the server’s physical location in the world and research current and historical whois information? Are you able to research other malicious domains associated with the same IP address and track Command and Control proxy servers back to specific malicious actors?

E-Discovery Analyst - File access case: You’ve recovered and indexed thousands of PDF files on a computer. One was flagged as key to the case and you are asked if the computer owner knew of and accessed this file.

  • Can you examine the Windows registry and link files to determine the exact time and date that specific users accessed individual files?


Why take this course?

Cybercrime is epidemic. The headlines declare it daily:

  • 2015 - SONY is devastated by an attack that destroys its internal systems, steals terabytes of private data, posts unreleased movies on Internet torrent sites, and humiliates corporate executives. The cost to corporate image and revenue stream is uncountable.
  • 2014 - Home Depot is hacked, losing an estimated 55 million credit cards to the cybercrime underground.
  • 2013 - Russian Hackers steal 40 million credit cards from Target, resulting in approx $1 billion in losses to the company.
  • 2012 - The Shamoon virus destroys nearly 30,000 Saudi Aramco Computers, temporarily shutting down one of the world’s largest corporations.
  • 2011 - SONY data breach lost personal details and payment information for approximately 77 million customers, resulting in massive monetary loss and the temporary closure of the PlayStation Gaming Network.

The corporations victimized in these situations were unprepared to respond to the attacks causing delayed investigations and reduced information flow to decision-making executives. Eventually, they contracted out the investigations to high-priced consultants, whose investigative results were often too little, too late.

IFCI-CCI’s mission is to provide our students the knowledge and skills necessary to respond to network attacks immediately, analyze the evidence, produce actionable cyber-intelligence, and implement it to shore up security vulnerabilities before they become massive breaches like those mentioned above.

There is a dearth of quality training in computer forensics, even less for hacker and malware focused investigations, and almost nothing that is available in a convenient online format that can be studied from the comfort of your own home, and fit to your own schedule. IFCI fills this void by providing the finest cybercrime investigation training in the world, created and delivered by some of the world’s foremost experts in their field, and streamed directly to any Internet-connected device you choose to employ.

Who this course is for:

  • Technical personnel tasked with, or interested in network security, computer forensics, or malware analysis.
  • Law enforcement officers, federal agents, and intelligence analysts tasked with cyber operations will all benefit from this course.
  • This is a beginner's course, it is also very useful for hobbyists, reporters, and any interested parties.
  • While this is a beginner's course, the material gets more and more complex as the class continues. It is in-depth, detailed, and hands-on and requires maximum effort for maximum benefit - therefore it is not recommended for casual observers not interested in putting forth the effort required to learn the material.

Course content

13 sections • 107 lectures • 16h 21m total length

  • Preview17:14
  • Subfields of Computer Forensics
    13:13
  • Roles and Responsibilities of the Cybercrime Investigator
    13:30
  • Computer Forensic Tools and Testing
    10:00
  • Sources of Digital Evidence
    08:22
  • Home Computer Setup for IFCI Labs
    06:31

  • Incident Response Triage and Forensic Acquisitons
    15:26
  • Hashes - Digital Fingerprints
    11:53
  • Lab1 - Hashing
    20:21
  • Incident Responder's Forensic Acquisition Process
    16:54
  • Different Approaches to Forensic Acquisition
    09:51
  • Volatile Memory Acquisition
    12:01
  • Lab2 - Forensic Acquisition Lab
    11:24

  • Introduction to File Systems and Operating Systems
    07:42
  • Data Structures
    36:24
  • Slack Space and Deleted Files
    10:02
  • File System Limitations
    04:26
  • FAT File Systems
    03:34
  • NTFS File Systems
    04:06
  • File Carving and File Fragmentation
    05:41
  • Lab 3 Deleted File Recovery
    14:54

  • Email Analysis
    11:47
  • Host and Web Based Email Extraction
    07:09
  • Email Header Analyisis and Base64 Encoding
    07:02
  • LAB 4 - Email Analysis
    20:22
  • Internet Activity Analysis Introduction
    03:19
  • Chrome and Firefox Analysis
    06:00
  • Internet Explorer Analysis
    05:52
  • Cookies, Cache, and IE Artifacts
    06:16
  • URL Obfuscation
    07:09
  • LAB 5 - Internet Activity Analysis
    15:01

  • Timeline Analysis
    12:59
  • Time Zone Issues
    05:16
  • Time Stamps
    08:12
  • Non-Standard Timestamps and Timeline Antiforensics
    07:14
  • MAC Time Triangulation
    05:26
  • User Attribution and Analysis
    07:40
  • Recycle Bin Analysis
    08:10
  • Lab 6 - Recycle Bin Analysis
    13:44
  • Link File Analysis
    05:51
  • Other Locations of Interest
    02:54
  • Lab 7 - Link File Analysis
    10:51

  • Thumbs.db and Thumbcache Analysis
    05:38
  • Prefetch File Analysis
    07:01
  • Lab 8 - Prefetch File Analysis
    16:07
  • Persistent RAM Files and System Restore Functions
    08:28
  • File Signature Analysis
    07:03
  • Lab 9 - File Signature Analysis
    10:10
  • Metadata Analysis
    08:13
  • Exif Data Analysis
    10:13
  • Lab 10 - Exif Data Analysis
    13:53

  • Windows Log Analysis
    04:58
  • System and Application Event Log Analysis
    05:27
  • Security Event Log Analysis
    05:47
  • Dr Watson Logs
    03:19
  • Lab 11 - Event Log Analysis
    10:11
  • Introduction to the Windows Registry
    05:29
  • Registry Analysis -USB Devices
    03:52
  • Registry Analysis - NTUser.dat - Part 1
    07:58
  • Registry Analysis - NTUser.dat - Part 2
    08:25
  • Registry Analysis - Autostarts
    06:03
  • Lab 12 - Registry Analysis
    12:14

  • The Hacking Process
    12:12
  • Hacker Motivations
    15:00
  • Hacker Strategies
    11:04
  • Botnet Investigations
    07:01
  • Drive-by Downloads
    05:07
  • Malware Propagation
    06:36
  • Polymorphism and Packers
    08:03
  • Social Engineering
    10:14
  • Rootkits
    06:05

  • Network Data Evidence and IP Addressing
    06:50
  • TCP and UDP Communication Protocols
    04:52
  • Network Communication and Ports
    04:58
  • HTTP Analysis and DNS Poisioning
    05:06
  • Network Scanners and Sniffers
    02:55

  • The Blurred Lines Between Cybercrime, Cyberwar, and Cyberespionage
    08:03
  • The Intersection of Cybercrime and Cyberwar
    08:02
  • Russian Organized Cybercrime
    15:45
  • Supply Chain Interdiction
    04:45
  • Criminal Domain Investigations
    06:54
  • Domain and IP Address Investigation Tools
    08:30
  • Lab 13 - Criminal Domain Investigations
    21:00
  • Stuxnet
    10:14
  • Point of Sale Server Attacks
    10:31
  • Point of Sale Server- Malware
    08:28
  • Point of Sale Server- Exfiltration
    03:46
  • Point of Sale Server- Advanced Investigative Techniques
    07:14

Instructor

Brian Hussey
Expert Cybercrime Investigator
Brian Hussey
  • 4.7 Instructor Rating
  • 336 Reviews
  • 1,708 Students
  • 2 Courses

Brian Hussey, EnCE, GREM, CCE, PMP, Q/EH,

Brian Hussey leads an elite team of Cybercrime Investigators working within US Federal Law Enforcement, His team has been responsible for investigating many of the most dangerous cyber attacks ever to threaten the United States and the fortune 500 companies that form its economic backbone. His team has pursued cyber criminals throughout the world and brought them to justice. Mr. Hussey's digital forensic analysis and testimony has resulted in Russian Point of Sale hackers, child predators, and malware authors from across the globe going to jail. He is a recognized expert in the fields of computer forensics, malware analysis, memory analysis, and cyber threat intelligence. Mr. Hussey has also designed network intrusion forensics and malware analysis training for US Federal law enforcement and our International partners. He has represented the United States by teaching these topics to the national police in countries such as: Ukraine, Japan, Latvia, Estonia, Moldova, Germany, Nigeria, India, and many others.

In 2011, Mr. Hussey decided the advanced cybercrime investigation techniques used by his team should be available outside of select Government circles and he began teaching at George Mason University in the Master of Computer Forensics program. In 2014, he founded IFCI to provide this same training to cybercrime fighters throughout the world. Mr. Hussey firmly believes that International cybercrime investigators working together, and armed with the proper training, can turn the tables on the relentless scourge of cyber crime.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.