- According to the Verizon Data Breach Investigation Report: 61% of breaches occurred in smaller businesses last year.
- According to UPS Capital: Breaches cost small businesses between $84,000 and $148,000 33% of firms required 3+ days to recover.
- According to the FBI, 84% of computer attacks are inside jobs.
Checklist
This course is taught as a self-paced online course and in a classroom setting.
-
Instruction by an expert facilitator
-
Online assistance
-
Specialized online manual and course materials
-
Personalized certificate as a Certified Cyber Crime Consultant
Course Objectives
- Effectively protect websites from being hacked.
- Demonstrate an understanding of professional, ethical and legal issues as it relates to cyber crime.
- Effectively investigate cyber extortion and cyber blackmail cases.
- Articulate oral and written skills necessary to develop company security policies.
- Effectively assess employee risks.
- Demonstrate an ability to perform penetration tests.
- Demonstrate an understanding of how internet scams are committed and how to investigate them.
- Demonstrate an ability to assess any business, or government agency on their physical and network vulnerabilities.
- Utilize techniques to effectively profile a cyber criminal.
- Demonstrate an ability to perform basic cell phone and tablet computer forensics.
- Understand how to teach parents about Online Child Safety.
- Social Media investigation.
- How to install and remove malware and viruses.
- How to consult with entertainers, athletes, celebrities, small businesses, corporations and governments agencies.
- How to start your own cyber security company.
- How to market your skill sets.
- How to build your own "Hacker For Hire" service legally.
- How to remove links from Google.
All Students Will Receive A Certificate Of Completion
Certified Cyber Crime Consultant.
Course Curriculum
-
1
-
Support
-
About This Course
-
Download Security And Acronyms Definitions
-
What Every Cyber Security Consultant Should Have
-
100 Hacking Tools and Resources
-
-
2
-
About This Course
-
What About The Geek Squad?
-
IT Manager, Computer Security Expert Or Hacker
-
Having A Career In IT And/Or Cyber Security
-
Basic Computer Problem
-
Jack Of All Trades
-
Don't Be Shy
-
Become A Teacher
-
Speak Less
-
The Basic Networking
-
Can You Trace A Network
-
Latency And Bandwidth
-
Do You Understand Script Writing
-
Backups Then Backup Again
-
Storing Your Password
-
Hard Work
-
Become A Project Manager
-
Understanding The Business Side
-
Don't Be Afraid To Debate
-
Always Have A Solutions
-
Ask Questions
-
Book Smart Vs. Street Smart
-
-
3
-
About This Chapter
-
Understanding Your Role As A Certified Cyber Crime Consultant
-
Ethics In Cyber/Computer Security
-
10 Leadership Qualities
-
Agent of the Government
-
Ethics And Leadership Quiz
-
-
4
-
About This Chapter
-
12 Things Every Leader Should Do To Prevent Cyber Attacks
-
Weekly Q&A - Certified Cyber Crime Consultant
-
-
5
-
Overview Of Cyber Insurance
-
Proof That Hacking Is Bigger Than All Drug Trafficking In The World!
-
What Does Cyber Insurance Cover?
-
Ten Things You Need To Know About Cyber Security Insurance
-
The Different Types Of Cyber Insurance
-
What Is Covered by Third-Party Cyber Insurance?
-
What Is Covered By First-Party Cyber Insurance?
-
What Is Not Covered By Cyber Insurance?
-
Determining Your Cyber Insurance Coverage Needs
-
Cyber Insurance Checklist
-
-
6
-
What Is A CIO?
-
What Is A CTO?
-
What Is A CISO?
-
What Is A IT Manager?
-
How to Assess an IT Department
-
Layering For Security
-
DMZ
-
VLAN's
-
NAT
-
Rogue IT Manager
-
Disabling The Windows Command Prompt
-
How to Disable USB Ports On Windows Machines
-
How to Disable USB Ports - Mac OS
-
The Difference Between A Server And A PC
-
Disabling The Windows Command Prompt
-
Securing Corporate Sensitive Data
-
Completely Erasing Data From A Disk
-
What Is a Proxy Server
-
Hiding Data Using Steganography
-
Steganography
-
Quiz
-
Network Topology Discovery Using Software Tools
-
Setting Up Remote Access Authentication
-
Additional Switch Hardening Techniques
-
Implementing A Secure Network Design
-
Secure Network Architecture Concepts
-
Additional Switch Hardening Techniques
-
Host Health Checks
-
Implementing A Secure Network Design
-
-
7
-
Lesson Introduction
-
Understanding Employee Risk
-
Identify The Importance Of Risk Management
-
Risk Assessments
-
The Risk Equation
-
Risk Calculation
-
Risk Exposure
-
Risk Analysis Methods
-
Risks Facing an Enterprise
-
Quiz - Risk Management
-
Assess Risk
-
ESA Frameworks
-
ESA Framework Assessment Process
-
Cloud Considerations
-
The NIST Framework and Models
-
The COBIT Frameworks
-
The ITIL Model
-
The ISO Model
-
The SABSA Framework
-
TOGAF
-
System-Specific Risk Analysis
-
Risk Determinations
-
Guidelines for Assessing Risk
-
Quiz - Assessing Risk
-
Mitigate Risk
-
Classes of Information
-
Classification of Information into CIA Levels
-
Security Control Categories
-
Control Review Based on CIA Requirements
-
DoS Attack
-
Database Intrusion
-
Application of Controls That Address CIA Requirements
-
CVE
-
Extreme Scenario Planning and Worst Case Scenarios
-
Risk Response Techniques
-
Additional Risk Management Strategies
-
Continuous Monitoring and Improvement
-
IT Governance
-
Verification and Quality Control
-
Defense in Depth
-
Defense In Depth Strategy
-
Integrate Documentation Into Risk Management
-
Quiz - Mitigating Risk
-
Policy Development
-
Policies, Standards And Guidelines
-
Quiz - Information Security Policies For Employees
-
Process and Procedure Development
-
Topics to Include in Security Policies and Procedures
-
Topics to Include in Security Policies and Procedures
-
Learning The Policies
-
Information Custodians - Personal Data
-
Information Custodians - No Personal Data
-
Data Classifications
-
Purpose
-
Description of the Information Security Sub-Policies
-
Policy on Employing Staff
-
Disciplinary Process
-
Understanding Control Types
-
Controls and Processes
-
Policy on Departing Staff
-
Physical Security Overview
-
Physical Security Guidelines and Requirements
-
Physical Security Control
-
Internal Security Control
-
Security Incidents And Reporting
-
Remote Access
-
Third Party Access Control to the Network
-
Maintenance Contracts
-
Wireless Network
-
External Network Connections
-
Risk Assessment and Audit
-
Access Control to the Network
-
Malicious Software
-
Data and Software Exchange
-
Unauthorized Software
-
Secure Disposal or Re-use of Equipment
-
Security Monitoring
-
Training and Awareness
-
Reporting Data Security Breaches and Weaknesses
-
System Configuration Management
-
Disaster Recovery Plans
-
Unattended Equipment and Clear Screen
-
IT Department Responsibilities
-
Backup and Recovery Policy
-
12 Security Best Practices for USB Drives
-
Contractors and Visitors
-
Security Control Types
-
Managing Risk
-
-
8
-
Intrusion Detection & Prevention
-
Example Of CISCO Intrusion Prevention System
-
Installing And Configuring A Firewall
-
Load Balancer Configuration
-
Installing And Configuring An Intrusion Detection System
-
DataLoss Prevention Systems
-
Configuring Network Security Technologies
-
-
9
-
Understanding Employees Rights
-
Understanding Law Enforcement Concerns
-
Quiz 1 - Getting Started
-
Weekly Q&A - Certified Cyber Crime Consultant
-
-
10
-
Lesson Introduction
-
Way Back Machine
-
Using Your Resources
-
Using Whois Lookups
-
Using DNS To Extract Information
-
Assess the Impact of Reconnaissance Incidents
-
Variables Affecting Reconnaissance
-
Evasion Techniques For Reconnaissance
-
Additional Tools
-
Finding Your IP Address
-
Finding Network Ranges
-
Google Hacking
-
Mining For Information Using Google Hacking
-
Google Hacking Database
-
Passive Reconnaissance Using The Internet
-
Using What You've Learned....
-
Weekly Q&A - Certified Cyber Crime Consultant
-
-
11
-
Why Cyber Crime Pays
-
Cybercrime Statistics: How Much Money are Cybercriminals Making?
-
Cybercrime Statistics: The Top Methods of Attack and Related Cybersecurity Concerns
-
Cyber Crime
-
Responding To Security Incidents
-
Investigating Security Incidents
-
Recovering Deleted Data
-
Types Of Attacks - Part 1
-
Different Attack Types - Part 2
-
Only The Rich Can Attain Cyber Crime Justice
-
Example Of Cyber Justice
-
Social Engineering Attack Troubleshooting
-
Hacking In The Entertainment Industry
-
The Weakest Link
-
Should A CEO Trust a Hacker Over His IT Department
-
Peeping Tom – Protecting Pictures on Computers and Cell Phones
-
Tracking An Attacker Using Shellbags
-
Finding Out What Your Working With On A Network
-
Tracking An Attacker Using Shellbags
-
Recovering Deleted Data
-
Creating A System Image For Forensic Analysis
-
Man-In-The-Middle-Attack
-
Common Attacks
-
Application Attacks
-
By Passing The Hash
-
Attack Countermeasures - Flooding
-
XML Injection
-
Clickjacking Threats
-
Pivoting Using Windows Remote Desktop
-
What Is DoS And DDoS
-
DoS Attacks
-
Botnets
-
Weekly Q&A - Certified Cyber Crime Consultant
-
-
12
-
Social Media Investigation
-
Social Networking Use in Legal Industries Slowly Gaining Momentum
-
Social Media Investigations - What You Need To Do Before Getting Started
-
How To Use Social Networking To Your Advantage
-
How To Create A Sock Puppets - Part 1
-
How To Create A Sock Puppets - Part 2
-
Social Media Investigation - Quick Tools & Websites For Investigations
-
Social Media Attacks & Hacks
-
Assuming a New Online Identity
-
How To Make Fake Profiles
-
Social Media Investigation - Tracking A Target On Facebook
-
Social Media Investigation - Facebook Reference Links
-
The Do's and Don'ts of The Dark Web
-
Protecting Your Own Privacy
-
-
13
-
How People Really Feel About Strong Passwords
-
Choosing The Right Password
-
Lie, Lie & Lie – Never Tell the Truth When Answering Security Questions
-
Passwords And Hashes
-
Force Password Changes
-
Can Changing Your Passwords Often May Be a Waste of Time
-
Resetting Your Password
-
Two-Factor Authentication
-
Example of 2 Key Authentication using gmail.com
-
USB Rubber Ducky - Take Social Engineering to the Next Level
-
Password Attacks
-
Example Of USB Rubber Ducky
-
Using More Than One Email Account
-
Securing Your Online Password
-
Identity And_Authentication Concepts
-
Cracking Passwords Using Software Tools
-
Implementing IAM
-
Weekly Q&A - Certified Cyber Crime Consultant
-
-
14
-
Web Browsers History, Bookmark and Cache Files
-
Which Web Browser Is Best For Security
-
Important Browsers Files
-
How Can I Protect My Browser Files
-
How To View Passwords In A Browser
-
Clickjacking Threats
-
-
15
-
Overview Of Social Engineering
-
Social Engineering
-
How To Trace An IP Address
-
Social Engineering
-
Types of Social Engineering
-
Understanding Phishing Scams And Social Engineering
-
Phishing And Delivery Media
-
Phishing and Common Components
-
Duplicate A Website
-
Assessing the Impact of Social Engineering
-
Quiz - Social Engineering
-
Weekly Q&A - Certified Cyber Crime Consultant
-
-
16
-
Case Study - Personal Security (Identity Theft)
-
Case Study - Medical Identity Theft
-
Identity Theft - Personal Security
-
Identity Theft - Medical Identity Theft
-
Identity Theft - Stats
-
Case Study - Credit Card Skimming
-
Case Study - Criminal Identity Theft
-
Case Study - Credit Freeze
-
Case Study - ID Theft Recovery
-
Identity Theft - Do It Yourself Identity Theft Recovery
-
Identity Theft - Tips for Avoiding Online Credit Card Fraud
-
Identity Theft - Criminal Identity Theft
-
Identity Theft - 5 Types of Credit Card Fraud
-
Identity Theft - Internet Security
-
Identity Theft - Credit Freeze / Security Freeze
-
Identity Theft - How Thieves Can Steal Your Identity
-
Identity Theft - Credit Reports
-
Robo-Call Fraud
-
Phishing Scams
-
-
17
-
Medicare Fraud, Don't Give them A Chance
-
Preventing Medicare Scams
-
Watch For The Package On Your Door Step
-
Tips On How To Protect Yourself
-
Medicare Quiz
-
Jamaican Lottery Scam
-
An Example On How One Man Lost $25k In A Lottery Scam
-
How It Works
-
Lottery Quiz
-
How To Avoid A Tech Support Scam
-
FBI Destroys Tech Support Scammer's Call Center!
-
Lottery Quiz
-
How To Avoid A Tech Support Scam
-
FBI Destroys Tech Support Scammer's Call Center!
-
Spotting and Avoiding Tech Support Scams
-
What to Do If You Were Scammed
-
What To Do If You Think There’s a Problem With Your Computer
-
Reporting Tech Support Scams
-
-
18
-
Examples of the Top 10 Internet Scams
-
Case Study - Credit Report
-
Don’t Open That Email – Spear Phishing
-
Phishing Email Scam
FREE PREVIEW -
Example - How To Perform A Phishing Attack
-
Internet Crime Reports
-
Internet Crime Prevention Tips
-
Switch-A-Roo
-
Watch What You’re Buying
-
What Can Go Wrong – Craigslist
-
Ebay - Hijacked Accounts
-
Hi-Tech Hustling On eBay
-
Second Chance Offers
-
Partial Refund
-
Paid Too Much For An Item
-
No item
-
Shill Bidding
-
Fakes
-
Hidden Shipping and Handling
-
Fake Money Orders and Bad Checks
-
-
19
-
Cell Phone Security Overview
-
Apple OS vs. Google Android
-
Jailbreaking an iPhone
-
Password Protect Your Phone
-
Having Two Numbers Is Better Than One!
-
Did You Download An App With Spyware On Your Android?
-
How Do You Protect Yourself From NFC?
-
Don’t Trust Your Cell Phone With a Stranger
-
Bump & Hack - NFC Hacking
-
Protecting Your Android Phone & Tablet
-
Cell Phone Hacking
-
Voicemail Security
-
-
20
-
Fighting Cyber Bullying
-
Cyber Bullying - Resources
-
Cyber Bullying - Social Media Stats
-
Cyber Bullying - Traditional Bullying
-
Cyber Bullying - Discrimination Stats
-
Case Study - Sexting And Cyber Bullying
-
Cyber Stalking - Stalking Using Technology
-
Case Study - Cyber Bullying
-
Cyber Stalking - Stats
-
Cyber Bullying - Workplace Bullying
-
Cyber Bullying - Things a School Can Do to Fight Cyber Bullying
-
Bullies vs. Cyber Bullies
-
Be Strong
-
Facts & Myths About Bullies and Cyber Bullies
-
Case Study - Cyber Bullying Tips | Owning Your Own Name
-
-
21
-
Create By An Narrated By.....
-
Child Safety Stats
-
Protecting Our Children
-
Case Study - How and Why You Should Install Spyware On Your Kids Computers
-
What your Put Out, Is What your Get Back
-
Quiz
-
How Not To Get In To Harvard
-
Stop Trying To Get Likes, Before It Kills You!
-
Watch Who You Call A Friend
-
Nerds Rule The World
-
Quiz
-
Beware Of Child Predators
-
Choosing The Right Password
-
Password Hacking Clock
-
Cyber Bullying VS Bullying
-
Quiz
-
-
22
-
Need-to-Know Definitions
-
What Is Surveillance?
-
What Is Bug Sweeping And TSCM?
-
When Is Surveillance Used?
-
Common Types of Surveillance
-
Surveillance Methods
-
Why Conduct Surveillance?
-
How Surveillance Works
-
What Is Electronic Surveillance?
-
Why Use Electronic Surveillance?
-
Is Electronic Surveillance Legal?
-
Computer and Mobile Phone Surveillance
-
Am I Under Electronic Surveillance?
-
What Can I Expect From An Investigator Specializing In Electronic Surveillance?
-
Computer Surveillance - What Does It Offer?
-
What Is Computer Surveillance?
-
Who Can Use Computer Surveillance?
-
How To Perform A Sweep
-
Eavesdrop Countering Devices
-
-
23
-
Who Created the Dark Web?
-
Is It Really Anonymous?
-
Getting Started With The Dark Web - Part 1
-
Getting Started With The Dark Web - Part 2
-
What You Need To Know
-
Inside The Dark Web
-
Tor And Anonymizers
-
How To Buy Products On The Dark Web
-
The Difference Between The Internet And The Dark Web
-
How To Access The Dark Web
-
-
24
-
The 5 Stages Of Computer Hacking - Part 1
-
The 5 Stages Of Computer Hacking Part 2
-
The Top 5 Places That People Think Will Never Be Hacked
-
Network and System Scanning Methods
-
Performing Reconnaissance on a Network - Part 1
-
Performing Reconnaissance on a Network - Part 2
-
Vulnerability Scanning
-
Enumeration Methods
-
Enumeration Techniques
-
How To Get Usernames And Passwords Across The Network
-
Download Wireshark
-
Capturing and Analyzing Data with Wireshark
-
Using Nessus
-
View The Nmap Manual
-
Overview Of Nmap
-
Quiz - Nmap 1
-
Quiz - Nmap 2
-
Quiz - Wireshark
-
Implementing Penetration Testing
-
Host Fingerprinting Using Software Tools
-
Configure Vulnerability Scanners
-
-
25
-
The Easiest Why To Hack, Audit And Test Physical Access
-
Introducing the WiFi Pineapple
-
WiFi Pineapple Primer - From Recon to PineAP
-
Shark Jack
-
The Power Of The Shark Jack
-
The Packet Squirrel
-
Using The Packet Squirrel
-
LANTurtle
-
How To Use The Lan Turtle
-
-
26
-
12 Signs A Personal Computer Has Been Hacked
-
Principles Of Cybersecurity
-
Microsoft Windows Security
-
How To Secure Windows 10
-
Security Mac OS
-
Don’t Trust Your Neighbor’s Wi-Fi
-
Internet Security
-
Top 10 Secure Computing Tips
-
-
27
-
Wireless Networking
-
Encryption - WEP, WPA And WPA
-
Finding Hotspots
-
Breaking WEP Encryption
-
Rogue Access Points And Attacks
-
Wireless Sniffing
-
Protecting Wireless Networks
-
-
28
-
What Is Web Application Testing
-
Web Application Architecture
-
Web Testing Tools
-
Cross Site Scripting
-
SQL Injection
-
Cross Site Request Forgery
-
Session Hijacking And Attacks And Cookies
-
-
29
-
History Of Cryptography
-
Types Of Cryptography
-
Public Key
-
Certificates
-
Hashing
-
AES, DES And DES
-
SSL and TLS
-
SSH
-
Disk Encryption
-
Cryptographic Analysis
-
Cryptanalysis Techniques
-
Hashing And Symmetric Cryptographic Algorithms
-
Identifying Asymmetric Cryptographic Algorithms
-
-
30
-
Understanding Malware
-
Ransomware Facts
-
Ransomware Statistics
-
Dealing With A Ransomware Attacks
-
Virus Types
-
How To Remove Ransomware
-
Anti-Virus Software
-
Viruses
-
Phage Virus
-
-
31
-
PART 1 - Learn To Make A Lucrative Career In Cyber Security
-
Part 2 - Learn To Make A Lucrative Career In Cyber Security
-
-
32
-
Final Exam
-
Learn How To Become A Spy
Learn Counter Surveillance
Included In This Course
USB RUBBER DUCKY
GET ONE OF THE FOLLOWING SHIRTS UPON COMPLETIONS
Once you complete this course, you will receive a free Certified Cyber Crime Consultant Shirt.
Pricing options
Download The National Cyber Security University App For Discount Codes.
-
4 x $200.00
Regular price
-
$700.00
Save $100