Certified Cyber Crime Consultant

2 sold in last 8 hours
A Certified Cyber Crime Consultant is an expert in consulting, advising, and investigating, not just companies that have been hacked but professional athletes, entertainers, politicians, corporate executives, small businesses, parents, attorneys, private investigators or anyone that has a unique problem to solve, and nowhere else to turn. What makes this...

Self-Pace With Live Instructor

Real time +45 visitor right now

A Certified Cyber Crime Consultant is an expert in consulting, advising, and investigating, not just companies that have been hacked but professional athletes, entertainers, politicians, corporate executives, small businesses, parents, attorneys, private investigators or anyone that has a unique problem to solve, and nowhere else to turn.

What makes this course different from other cyber security courses is that Certified Cyber Crime Consultant, teaches the business and technical side of security.  Most security certification and degree programs only teach the technical side, leaving students lacking the knowledge to start their own cyber security business or how to pitch their services to companies.

This course will educate and prepare students for a lucrative and prosperous career in the field of cyber security.  Its professors have long histories in the cyber security field, and have taught students from various backgrounds including cyber security professionals in local, state, and federal law enforcement.  This course prepares not only college students but high school students, as well.

This course is taught as a self-paced, live instructor and in a classroom setting.

  • You can take this course at your own paced
  • Instruction by an expert facilitator
  • Online assistance
  • Live weekly online instructors 
  • Specialized online manual and course materials
  • Personalized certificate as a Certified Cyber Crime Consultant

Course Overview

  • Effectively protect websites from being hacked. 
  • Demonstrate an understanding of professional, ethical and legal issues as it relates to cyber crime. 
  • Effectively investigate cyber extortion and cyber blackmail cases. 
  • Articulate oral and written skills necessary to develop company security policies. 
  • Effectively assess employee risks. 
  • Demonstrate an ability to perform penetration tests. 
  • Demonstrate an understanding of how internet scams are committed and how to investigate them. 
  • Demonstrate an ability to assess any business, or government agency on their physical and network vulnerabilities. 
  • Utilize techniques to effectively profile a cyber criminal. 
  • Demonstrate an ability to perform basic cell phone and tablet computer forensics. 
  • Understand how to teach parents about Online Child Safety.
  • Social Media investigation.
  • How to install and remove malware and viruses.
  • How to consult with entertainers, athletes, celebrities, small businesses, corporations and governments agencies.
  • How to start your own cyber security company.
  • How to market your skill sets.
  • How to build your own "Hacker For Hire" service legally. 
  • How to remove links from Google.


Become An Experts In

Unlike other certifications in Cyber Security or IT security, Certified Cyber Crime Consultant is the Swiss Army Knife of Cyber Security Consulting and Investigation.

 You will learn to work with:

  • Consumers (Including Parents and Children)
  • Small Business
  • Corporations
  • Local, State and Federal Government (Domestic and Foreign)
  • Attorneys
  • Law Enforcement and Private Investigators
  • Athletes and Entertainers

You Will  Be Come An Expert In:

  • Hacked Network - As A Certified Cyber Crime Consultant, You Will Learn How To Investigate Computers, Websites And Networks That Have Been Hacked.

  • Cyber Bullying, Cyber Extortion & Blackmail - Learn How Consumers, Business People, Entertainers, Athletes, Public Figures Are Being Bullied, Blackmailed Or Extorted.

  • How To Consultant - How To Consultant With Other IT Managers, Law Enforcement, CEO's, Small Business Owners, Athletes, Entertainers and Other Organizations.
  • Social Media Investigations - Learn Different Techniques You Can Use To Locate A Person, Find Their Locations, Track Their Activities, Locate Their Friends And Family, Plus A Lot More.
  • Identity Theft - Learn How Individuals As Well As Companies Have Their Identities Stolen. Then Learn What The Bad Guys Do Once They Have The Identities.
  • Scams - Learn About The Different Scams And Schemes Crooks Use To Steal Information. This Includes Email Scams, Telephone Scams And More.


Course Curriculum

Getting Started

  • Support
  • About This Course
  • Download Security And Acronyms Definitions
  • What Every Cyber Security Consultant Should Have
  • 100 Hacking Tools and Resources

Making A Great Cyber Crime Consultant

  • About This Course
  • What About The Geek Squad?
  • IT Manager, Computer Security Expert Or Hacker
  • Having A Career In IT And/Or Cyber Security
  • Basic Computer Problem
  • Jack Of All Trades
  • Don't Be Shy
  • Become A Teacher
  • Speak Less
  • The Basic Networking
  • Can You Trace A Network
  • Latency And Bandwidth
  • Do You Understand Script Writing
  • Backups Then Backup Again
  • Storing Your Password
  • Hard Work
  • Become A Project Manager
  • Understanding The Business Side
  • Don't Be Afraid To Debate
  • Always Have A Solutions
  • Ask Questions
  • Book Smart Vs. Street Smart

Ethics And Leadership

  • About This Chapter
  • Understanding Your Role As A Certified Cyber Crime Consultant
  • Ethics In Cyber/Computer Security
  • 10 Leadership Qualities
  • Agent of the Government
  • Ethics And Leadership Quiz

12 Things That Every Leader Should Do To Prevent Cyber Attacks

  • About This Chapter
  • 12 Things Every Leader Should Do To Prevent Cyber Attacks
  • Weekly Q&A - Certified Cyber Crime Consultant

Cyber Insurance

  • Overview Of Cyber Insurance
  • Proof That Hacking Is Bigger Than All Drug Trafficking In The World!
  • What Does Cyber Insurance Cover?
  • Ten Things You Need To Know About Cyber Security Insurance 
  • The Different Types Of Cyber Insurance
  • What Is Covered By First-Party Cyber Insurance?
  • What Is Not Covered By Cyber Insurance?
  • Determining Your Cyber Insurance Coverage Needs
  • Cyber Insurance Checklist

Corporate Networks, Security And Environments

  • What Is A CIO?
  • What Is A CTO?
  • What Is A CISO?
  • What Is A IT Manager?
  • How to Assess an IT Department
  • Layering For Security
  • DMZ
  • VLAN's
  • NAT
  • Rogue IT Manager
  • Disabling The Windows Command Prompt
  • How to Disable USB Ports On Windows Machines 
  • How to Disable USB Ports - Mac OS
  • The Difference Between A Server And A PC 
  • Disabling The Windows Command Prompt
  • Securing Corporate Sensitive Data
  • Completely Erasing Data From A Disk
  • What Is a Proxy Server
  • Hiding Data Using Steganography
  • Steganography
  • Network Topology Discovery Using Software Tools
  • Setting Up Remote Access Authentication
  • Additional Switch Hardening Techniques
  • Implementing A Secure Network Design
  • Secure Network Architecture Concepts
  • Additional Switch Hardening Techniques
  • Host Health Checks
  • Implementing A Secure Network Design

Assessing Information Security Risk

  • Lesson Introduction
  • Understanding  Employee Risk 
  • Identify The Importance Of Risk Management
  • Risk Assessments
  • The Risk Equation
  • Risk Calculation
  • Risk Exposure
  • Risk Analysis Methods
  • Risks Facing an Enterprise
  • Assess Risk
  • ESA Frameworks
  • ESA Framework Assessment Process
  • Cloud Considerations
  • The NIST Framework and Models
  • The COBIT Frameworks
  • The ITIL Model
  • The ISO Model
  • The SABSA Framework
  • System-Specific Risk Analysis
  • Risk Determinations
  • Guidelines for Assessing Risk
  • Mitigate Risk
  • Classes of Information
  • Classification of Information into CIA Levels
  • Security Control Categories
  • Control Review Based on CIA Requirements
  • DoS Attack
  • Database Intrusion
  • Application of Controls That Address CIA Requirements
  • CVE
  • Extreme Scenario Planning and Worst Case Scenarios
  • Risk Response Techniques
  • Additional Risk Management Strategies
  • Continuous Monitoring and Improvement
  • IT Governance
  • Verification and Quality Control
  • Defense in Depth
  • Defense In Depth Strategy
  • Integrate Documentation Into Risk Management
  • Configuring Network Security Technologies

Firewalls, IDS And IPS Systems

  • Intrusion Detection & Prevention
  • Example Of CISCO Intrusion Prevention System
  • Installing And Configuring A Firewall
  • Load Balancer Configuration
  • Installing And Configuring An Intrusion Detection System
  • DataLoss Prevention Systems

Analyzing Reconnaissance Threats 

  • Lesson Introduction
  • Way Back Machine
  • Using Your Resources
  • Using Whois Lookups 
  • Using DNS To Extract Information
  • Assess the Impact of Reconnaissance Incidents
  • Variables Affecting Reconnaissance
  • Evasion Techniques For Reconnaissance
  • Additional Tools
  • Finding Your IP Address
  • Finding Network Ranges
  • Google Hacking
  • Mining For Information Using Google Hacking
  • Google Hacking Database
  • Passive Reconnaissance Using The Internet
  • Using What You've Learned....

 Cyber Crime Tips And Investigations

  • Why Cyber Crime Pays
  • Cyber Crime
  • Responding To Security Incidents
  • Investigating Security Incidents
  • Recovering Deleted Data
  • Types Of Attacks - Part 1
  • Different Attack Types - Part 2
  • Cybercrime Statistics: How Much Money are Cybercriminals Making?
  • Cybercrime Statistics: The Top Methods of Attack and Related Cybersecurity Concerns
  • Only The Rich Can Attain Cyber Crime Justice
  • Example Of Cyber Justice
  • Social Engineering Attack Troubleshooting
  • Hacking In The Entertainment Industry
  • The Weakest Link
  • Should A CEO Trust a Hacker Over His IT Department
  • Peeping Tom – Protecting Pictures on Computers and Cell Phones
  • Tracking An Attacker Using Shellbags
  • Finding Out What Your Working With On A Network
  • Recovering Deleted Data
  • Creating A System Image For Forensic Analysis
  • Man-In-The-Middle-Attack
  • Common Attacks
  • Application Attacks
  • By Passing The Hash
  • Attack Countermeasures - Flooding
  • XML Injection
  • Clickjacking Threats
  • Pivoting Using Windows Remote Desktop
  • What Is DoS And DDoS
  • DoS Attacks
  • Botnets

Social Media Investigation

  • Social Media Investigation
  • Social Networking Use in Legal Industries Slowly Gaining Momentum
  • Social Media Investigations - What You Need To Do  Before Getting Started
  • How To Use Social Networking To Your Advantage
  • How To Create A Sock Puppets - Part 1
  • How To Create A Sock Puppets - Part 2
  • Social Media Investigation - Quick Tools & Websites For Investigations
  • Social Media Attacks & Hacks
  • Assuming a New Online Identity
  • How To Make Fake Profiles
  • Social Media Investigation - Facebook Reference Links
  • Social Media Investigation - Tracking A Target On Facebook
  • Getting Started With The Dark Web - Part 1
  • Getting Started With The Dark Web - Part 2
  • The Do's and Don'ts of The Dark Web
  • What You Need To Know
  • Protecting Your Own Privacy

Password Security

  • How People Really Feel About Strong Passwords
  • Choosing The Right Password
  • Lie, Lie & Lie – Never Tell the Truth When Answering Security Questions
  • Passwords And Hashes
  • Force Password Changes
  • Can Changing Your Passwords Often May Be a Waste of Time
  • Resetting Your Password
  • Two-Factor Authentication
  • Example of 2 Key Authentication using gmail.com
  • USB Rubber Ducky - Take Social Engineering to the Next Level 
  • Password Attacks
  • Example Of USB Rubber Ducky
  • Using More Than One Email Account
  • Securing Your Online Password
  • Identity And_Authentication Concepts
  • Cracking Passwords Using Software Tools
  • Implementing IAM

Pros and Cons Of Web Browsers 

  • Web Browsers History, Bookmark and Cache Files
  • Which Web Browser Is Best For Security 
  • Important Browsers Files
  • How Can I Protect My Browser Files
  • How To View Passwords In A Browser
  • Clickjacking Threats

Social Engineering

  • Overview Of Social Engineering
  • Social Engineering
  • How To Trace An IP Address 
  • Social Engineering
  • Types of Social Engineering
  • Understanding Phishing Scams And Social Engineering  
  • Phishing And Delivery Media
  • Phishing and Common Components
  • Duplicate A Website 
  • Assessing the Impact of Social Engineering  

Identity Theft

  • Case Study - Personal Security (Identity Theft)
  • Case Study - Medical Identity Theft
  • Identity Theft - Personal Security
  • Identity Theft - Medical Identity Theft
  • Identity Theft - Stats
  • Case Study - Credit Card Skimming 
  • Case Study - Criminal Identity Theft
  • Case Study - Credit Freeze 
  • Case Study - ID Theft Recovery
  • Identity Theft - Do It Yourself Identity Theft Recovery
  • Identity Theft - Tips for Avoiding Online Credit Card Fraud
  • Identity Theft - Criminal Identity Theft
  • Identity Theft - 5 Types of Credit Card Fraud
  • Identity Theft - Internet Security
  • Identity Theft - Credit Freeze / Security Freeze
  • Identity Theft - How Thieves Can Steal Your Identity
  • Identity Theft - Credit Reports
  • Robo-Call Fraud
  • Phishing Scams

Protector Senior Citizens

  •  Medicare Fraud, Don't Give them A Chance
  • Preventing Medicare Scams
  • Watch For The Package On Your Door Step
  • Tips On How To Protect Yourself
  • Jamaican Lottery Scam
  • An Example On How One Man Lost $25k In A Lottery Scam
  • How To Avoid A Tech Support Scam

  • FBI Destroys Tech Support Scammer's Call Center!
  • How To Avoid A Tech Support Scam
  • FBI Destroys Tech Support Scammer's Call Center!
  • Spotting and Avoiding Tech Support Scams
  • What To Do If You Think There’s a Problem With Your Computer
  • Reporting Tech Support Scams

Scams & Schemes

  • Examples of the Top 10 Internet Scams
  • Case Study - Credit Report
  • Don’t Open That Email – Spear Phishing
  • Phishing Email Scam
  • Example - How To Perform A Phishing Attack
  • Internet Crime Reports
  • Internet Crime Prevention Tips
  • Switch-A-Roo
  • Watch What You’re Buying
  • What Can Go Wrong – Craigslist
  • Ebay - Hijacked Accounts
  • Hi-Tech Hustling On eBay
  • Second Chance Offers
  • Partial Refund
  • Paid Too Much For An Item
  • Shill Bidding
  • Hidden Shipping and Handling
  • Fake Money Orders and Bad Checks

Cell Phone Security

  • Cell Phone Security Overview
  • Apple OS vs. Google Android
  • Jailbreaking an iPhone
  • Password Protect Your Phone
  • Having Two Numbers Is Better Than One!
  • Did You Download An App With Spyware On Your Android?
  • How Do You Protect Yourself From NFC?
  • Don’t Trust Your Cell Phone With a Stranger
  • Bump & Hack - NFC Hacking
  • Protecting Your Android Phone & Tablet
  • Cell Phone Hacking
  • Voicemail Security

Cyber Bullying 

  • Fighting Cyber Bullying
  • Cyber Bullying - Resources
  • Cyber Bullying - Social Media Stats
  • Cyber Bullying - Traditional Bullying
  • Cyber Bullying - Discrimination Stats
  • Case Study - Sexting And Cyber Bullying
  • Cyber Stalking - Stalking Using Technology
  • Case Study - Cyber Bullying
  • Cyber Stalking - Stats
  • Cyber Bullying - Workplace Bullying
  • Cyber Bullying - Things a School Can Do to Fight Cyber Bullying
  • Bullies vs. Cyber Bullies
  • Facts & Myths About Bullies and Cyber Bullies
  • Case Study - Cyber Bullying Tips | Owning Your Own Name

Child Safety And Security

  • Child Safety Stats
  • Protecting Our Children
  • Case Study - How and Why You Should Install Spyware On Your Kids Computers
  • What your Put Out, Is What your Get Back
  • Stop Trying To Get Likes, Before It Kills You!
  • Watch Who You Call A Friend
  • Nerds Rule The World
  • Beware Of Child Predators
  • Cyber Bullying VS Bullying

Surveillance Countermeasures (TSCM)

  • Need-to-Know Definitions
  • What Is Surveillance?
  • What Is Bug Sweeping And TSCM?
  • When Is Surveillance Used?
  • Common Types of Surveillance
  • Surveillance Methods
  • Why Conduct Surveillance?
  • How Surveillance Works
  • What Is Electronic Surveillance?
  • Why Use Electronic Surveillance?
  • Is Electronic Surveillance Legal?
  • Computer and Mobile Phone Surveillance
  • Am I Under Electronic Surveillance?
  • What Can I Expect From An Investigator Specializing In Electronic Surveillance?
  • Computer Surveillance - What Does It Offer?
  • What Is Computer Surveillance?
  • Who Can Use Computer Surveillance?
  • How To Perform A Sweep
  • Eavesdrop Countering Devices

The Dark Web

  • Inside The Dark Web
  • Tor And Anonymizers
  • How To Buy Products On The Dark Web
  • The Difference Between The Internet And The Dark Web
  • How To Access The Dark Web
  • Who Created the Dark Web?
  • Is It Really Anonymous?

Becoming A Hacker

      • The 5 Stages Of Computer Hacking - Part 1
      • The 5 Stages Of Computer Hacking - Part 2
      • The Top 5 Places That People Think Will Never Be Hacked
      • Network and System Scanning Methods
      • Performing Reconnaissance on a Network - Part 1
      • Performing Reconnaissance on a Network - Part 2
      • Vulnerability Scanning
      • Enumeration Methods
      • Enumeration Techniques
      • How To Get Usernames And Passwords Across The Network
      • Download Wireshark
      • Capturing and Analyzing Data with Wireshark 
      • Using Nessus
      • View The Nmap Manual
      • Overview Of Nmap
      • Implementing Penetration Testing
      • Host Fingerprinting Using Software Tools
      • Configure Vulnerability Scanners

      Hacking With Hardware

      • The Easiest Why To Hack, Audit And Test Physical Access
      • Introducing the WiFi Pineapple
      • WiFi Pineapple Primer - From Recon to PineAP
      • Shark Jack
      • The Power Of The Shark Jack 
      • The Packet Squirrel 
      • Using The Packet Squirrel
      • LANTurtle
      • How To Use The Lan Turtle


      • History Of Cryptography
      • Types Of Cryptography
      • Public Key
      • Certificates
      • Hashing
      • AES, DES And DES
      • SSL and TLS
      • SSH
      • Disk Encryption
      • Cryptographic Analysis
      • Cryptanalysis Techniques
      • Hashing And Symmetric Cryptographic Algorithms
      • Identifying Asymmetric Cryptographic Algorithms

      Personal Computer Security

      • 12 Signs A Personal Computer Has Been Hacked
      • Principles Of Cybersecurity
      • Principles Of Cybersecurity
      • Microsoft Windows Security
      • How  To Secure Windows 10
      • Security Mac OS
      • Don’t Trust Your Neighbor’s  Wi-Fi
      • Internet Security 
      • Top 10 Secure Computing Tips

      Wireless Networking

      • Wireless Networking
      • Encryption - WEP, WPA And WPA
      • Finding Hotspots
      • Breaking WEP Encryption
      • Rogue Access Points And Attacks
      • Wireless Sniffing
      • Protecting Wireless Networks

      Web Application Hacking

      • What Is Web Application Testing
      • Web Application Architecture
      • Web Testing Tools
      • Cross Site Scripting
      • SQL Injection
      • Cross Site Request Forgery
      • Session Hijacking And Attacks And Cookies

      Learn To Make A Lucrative Career In Cyber Security

      • PART 1 - Learn To Make A Lucrative Career In Cyber Security 
      •  Part 2 - Learn To Make A Lucrative Career In Cyber Security 


        All Students will receive a certificate of completion as a Certified Cyber Crime Consultant.

        Have Questions? Ask An Expert

        Recently Viewed Category

        • BUY, NOW, PAY LATER!

          Split your entire online purchase into 4 interest-free payments, over 6 weeks with no impact to your credit.


          CompTIA | NICCS | DHS | International Law Enforcement Educators And Trainers Association | Start Bar The Georgia

        • WORLD RENOWN

          Since 2016 we have sold courses in 27 countries in on 7 continent.