Cryptocurrency Investigation Training Course

Duration

21 hours (usually 3 days including breaks)

Requirements

  • A general knowledge on technology
  • Experience with forensic investigation and legal background
  • An understanding of financial transactions
  • A general comprehension of cryptography

Audience

  • Investigators
  • Cyber Security Specialists

Overview

Cryptocurrency is a recent medium of financial exchange based on Blockchain technology that is decentralized, encrypted, and electronically stored. Investigation on Cryptocurrency enables authorized government agencies to address risks and threats focused on this new financial system.

This instructor-led, live training (online or onsite) is aimed at investigators and cyber security specialists who wish to understand cryptocurrency technology, identify criminal activities linked to it, and implement proper legal actions in their digital investigation.

By the end of this training, participants will be able to:

  • Understand the logic behind Blockchain and Cryptocurrency.
  • Identify and prosecute illicit activities associated with Cryptocurrency transactions.
  • Implement methods and tools useful to Cryptocurrency investigation.
  • Integrate traditional and digital forensics for the protection of Cryptocurrency holders.

Format of the Course

  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.

Course Customization Options

  • To request a customized training for this course, please contact us to arrange.

Course Outline

Introduction

Overview of Blockchain Technology

  • Cryptocurrency as a Blockchain Application

Understanding Cryptocurrency and Online Marketplace Transactions

  • Bitcoin and Other Cryptocurrencies

Identifying Cryptocurrency Trails

  • Web, Desktop, and Mobile Wallets
  • Hardware Wallets
  • Applications for Authenticating Exchanges

Overview of the Dark Web and Criminal Elements in Cryptocurrency

Analyzing Blockchain Forensics

Utilizing Open-source Tools for Track and Trace Operations

  • The Web Crawler

Responding to Ransomware Attacks and Data Breaches

Decrypting Money Laundering Processes

  • Mitigating Cryptocurrency Theft and Scam

Securing Cryptocurrency Transactions through Digital Evidence

Incorporating Existing Compliance Programs

  • The AML Compliance and Cryptocurrency

Summary and Conclusion

Leave a Reply

Your email address will not be published. Required fields are marked *