- You can take this course at your own paced
- Instruction by an expert facilitator
- Online assistance
- Live weekly online instructors
- Specialized online manual and course materials
- Personalized certificate as a Certified Cyber Crime Consultant
Certified Cyber Crime Consultant
A Certified Cyber Crime Consultant is an expert in consulting, advising, and investigating, not just companies that have been hacked but professional athletes, entertainers, politicians, corporate executives, small businesses, parents, attorneys, private investigators or anyone that has a unique problem to solve, and nowhere else to turn.
What makes this course different from other cyber security courses is that Certified Cyber Crime Consultant, teaches the business and technical side of security. Most security certification and degree programs only teach the technical side, leaving students lacking the knowledge to start their own cyber security business or how to pitch their services to companies.
This course will educate and prepare students for a lucrative and prosperous career in the field of cyber security. Its professors have long histories in the cyber security field, and have taught students from various backgrounds including cyber security professionals in local, state, and federal law enforcement. This course prepares not only college students but high school students, as well.
This course is taught as a self-paced, live instructor and in a classroom setting.
Get Hired
There are a LOT of jobs that have a Certified Cyber Crime Consultant (C4) component to them, but in the vacancy, they might not use the word Open-Source Intelligence “OSINT”. Sometimes because they simply don’t know that what they’re asking of you is C4 related or sometimes because they use a different word to describe what you may call C4 (e.g. recruiters call doing online research ‘sourcing’). So, keep in mind that simply Googling for ‘C4 jobs’ might not get you the vacancy you’re looking for.
You’ll have to decide in what kind of field you’d like to work. Make a decision between working for the public (government/law enforcement) or private (security firms/banks/journalism/etc.). This might help you down narrowing your search. After making this decision it’s time to look at the kind of sector you’d like to work in.
Below we’ve described a couple of sectors where you could find C4 related jobs. Of course, always keep in mind that in your native language job titles and/or descriptions can be different from the English ones we’re describing here, but maybe it will inspire you to find just that one perfect job
Tech:
The technology sector has multiple area’s that might be interesting.
Think about Computer Forensics; this could be working with hardware, but also with software! Finding a username in a used phone to trace down an owner, reverse engineer a piece of malware or taking a look at the infrastructure of a hosting company, might me some of the tasks you could do. Although in this field a degree or a certain level of experience might be necessary.
Then there are Blue Team (who are defending) and Red Team (who are attacking) jobs. Both fields might require you to do some OSINT. Blue teaming (e.g. can someone find the personal details of my boss online easily?) or Red teaming (e.g. can I find pictures of employee badges online in order to replicate them?)
Companies who want to make sure that they are protected against any cyber threats might be looking for a Cyber Threat Analyst (or Cyber Threat Intelligence (CTI)). Monitoring if leaked data breaches might contain information about the company or the employees, if there are vulnerabilities that might be exploited to enter the company servers or maybe if any secret/patented information is being sold somewhere online, might be some of your tasks.
Finance & Accounting:
Like to trace down where money went? Or maybe interested in digging into background of directors, companies and foundations? Maybe working as an Anti Money Laundering Investigator (also shortened as ‘AML’) might be interesting. Those jobs are mainly with private companies, but don’t forget the public sector does the same kind of investigations.
Most banks and other financial companies want (or are obligated) to know about their costumers these days. Doing background checks are necessary and you can’t do background checks without checking out the internet. So jobs in Customer Due Diligence (CDD) or Know Your Customer (KYC) might be something you want to check out.
And also don’t forget about people who might be committing fraud. As a Fraud Investigator or Insurance Investigator, working for an insurance company as an example, you might have to research someone online to see if he might be swindling the insurance company.
The same goes for Debt Collectors. They might have to see if a company might have continued under a new name or check to see if a person with a large debt might be living ‘La Vida Loca’ at a tropical island.
Like the legal side too? Then maybe Brand Protection can be something you could be interested in. You could be searching for an illegal webshop selling fake shoes or bags and your job would be to trace down this person behind the webshop.
Journalism/media:
Now a days news stories can be covered without even entering the area where something has happened. The covering of the crash of plain MH-17 by Bellingcat, the covering of the execution of women and children in Cameroon by BBC Africa or the #EUarms project by Lighthouse Reports are just a couple of examples.
‘Old’ media like newspapers and television are relaying more and more on Open Source data in order to find new stories or to fact check their stories. If this is something you’d like to be a part of, try to look for jobs with titles like Data Journalism, Editorial Researcher, Visual Investigator or Fact Checker/Verification.
People:
Ever thought about how recruiters found you on LinkedIn? Exactly; they did some research too. Most recruiters (‘sourcers’ or human resources) are very good at finding people. So working in recruitment might be a cool challenge for you too! Think about scraping Meetup.com and LinkedIn groups in order to find that one perfect candidate with a certain degree and who attends meetups about Javascript in a certain area.
A couple of other professions focused on finding people are Bounty hunters/skip tracers, Private Investigators, Business/corporate investigators,
Public sector:
Most of the jobs described above might be jobs you could also find within the public sector (government/law enforcement/military/etc). Think about doing financial research to see if someone might be committing bankruptcy fraud, reverse engineer malware to find a cyber criminal, monitoring online to see if someone is talking about committing an attack on people of a certain religion, searching for illegal webshops that sell narcotics on the Dark web, doing an analysis on someone’s social media friends to find that one missing link in a criminal gang, etcetera.
Although, when doing these jobs within the public sector, this sometimes restrict you from talking about your job/investigation. When you think you might struggle with this, the public sector might be not your cup of tea.
Words you could use to search for these kind of jobs might be something like ‘surveillance’, ‘detective’, ‘criminal investigator’, ‘digital forensics’, ‘threat intelligence/analyst’, ‘internet investigator/expert’, ‘crime analyst’, ‘cyber investigative analyst’ and ‘cyber crime investigator’.
Advice from a recruiter:
Jan Tegze is a recruiter (sourcer) who uses a various range of C4 techniques to find candidates. He has some advice for you too:
Referrals are the most effective source of candidates for many companies. I am sure that many C4 people have friends working for some cool companies, so my recommendation will be to reach some of those friends and tell them that you are available on the market.
Many companies that are looking for people with C4 experience even that are not hiring could be able to open the role if they find an interesting candidate. That’s why it is always good to reach out to the recruiter and ask him/her if they are not looking for somebody with your experience.
If you have an LinkedIn profile you can turn on this option https://www.linkedin.com/help/linkedin/answer/67405?lang=en and you can let recruiters know. Your employer will not see it, but if you work for company A, and that company is connected with B, those recruiters can see that you are open.
Jan Tegze, Recruiter/Sourcer
Happy job hunting!
Maybe there are some jobs mentioned above which you haven’t thought about yet. Hopefully this will inspire you to go and search for that one job that suits you perfectly!
And if we’ve missed a job title/description, you’ve got another question or some advice for our readers, please leave a comment below or use the hashtag #OSINTcurious on Twitter!
Become An Experts In
Unlike other certifications in Cyber Security or IT security, Certified Cyber Crime Consultant is the Swiss Army Knife of Cyber Security Consulting and Investigation.
You will learn to work with:
- Consumers (Including Parents and Children)
- Small Business
- Corporations
- Local, State and Federal Government (Domestic and Foreign)
- Attorneys
- Law Enforcement and Private Investigators
- Athletes and Entertainers
You Will Be Come An Expert In:
Course Curriculum
Getting Started
- Support
- About This Course
- Download Security And Acronyms Definitions
- What Every Cyber Security Consultant Should Have
- 100 Hacking Tools and Resources
Making A Great Cyber Crime Consultant
- About This Course
- What About The Geek Squad?
- IT Manager, Computer Security Expert Or Hacker
- Having A Career In IT And/Or Cyber Security
- Basic Computer Problem
- Jack Of All Trades
- Don't Be Shy
- Become A Teacher
- Speak Less
- The Basic Networking
- Can You Trace A Network
- Latency And Bandwidth
- Do You Understand Script Writing
- Backups Then Backup Again
- Storing Your Password
- Hard Work
- Become A Project Manager
- Understanding The Business Side
- Don't Be Afraid To Debate
- Always Have A Solutions
- Ask Questions
- Book Smart Vs. Street Smart
Ethics And Leadership
- About This Chapter
- Understanding Your Role As A Certified Cyber Crime Consultant
- Ethics In Cyber/Computer Security
- 10 Leadership Qualities
- Agent of the Government
- Ethics And Leadership Quiz
12 Things That Every Leader Should Do To Prevent Cyber Attacks
- About This Chapter
- 12 Things Every Leader Should Do To Prevent Cyber Attacks
- Weekly Q&A - Certified Cyber Crime Consultant
Cyber Insurance
- Overview Of Cyber Insurance
- Proof That Hacking Is Bigger Than All Drug Trafficking In The World!
- What Does Cyber Insurance Cover?
- Ten Things You Need To Know About Cyber Security Insurance
- The Different Types Of Cyber Insurance
- What Is Covered By First-Party Cyber Insurance?
- What Is Not Covered By Cyber Insurance?
- Determining Your Cyber Insurance Coverage Needs
- Cyber Insurance Checklist
Corporate Networks, Security And Environments
- What Is A CIO?
- What Is A CTO?
- What Is A CISO?
- What Is A IT Manager?
- How to Assess an IT Department
- Layering For Security
- DMZ
- VLAN's
- NAT
- Rogue IT Manager
- Disabling The Windows Command Prompt
- How to Disable USB Ports On Windows Machines
- How to Disable USB Ports - Mac OS
- The Difference Between A Server And A PC
- Disabling The Windows Command Prompt
- Securing Corporate Sensitive Data
- Completely Erasing Data From A Disk
- What Is a Proxy Server
- Hiding Data Using Steganography
- Steganography
- Network Topology Discovery Using Software Tools
- Setting Up Remote Access Authentication
- Additional Switch Hardening Techniques
- Implementing A Secure Network Design
- Secure Network Architecture Concepts
- Additional Switch Hardening Techniques
- Host Health Checks
- Implementing A Secure Network Design
Assessing Information Security Risk
- Lesson Introduction
- Understanding Employee Risk
- Identify The Importance Of Risk Management
- Risk Assessments
- The Risk Equation
- Risk Calculation
- Risk Exposure
- Risk Analysis Methods
- Risks Facing an Enterprise
- Assess Risk
- ESA Frameworks
- ESA Framework Assessment Process
- Cloud Considerations
- The NIST Framework and Models
- The COBIT Frameworks
- The ITIL Model
- The ISO Model
- The SABSA Framework
- TOGAF
- System-Specific Risk Analysis
- Risk Determinations
- Guidelines for Assessing Risk
- Mitigate Risk
- Classes of Information
- Classification of Information into CIA Levels
- Security Control Categories
- Control Review Based on CIA Requirements
- DoS Attack
- Database Intrusion
- Application of Controls That Address CIA Requirements
- CVE
- Extreme Scenario Planning and Worst Case Scenarios
- Risk Response Techniques
- Additional Risk Management Strategies
- Continuous Monitoring and Improvement
- IT Governance
- Verification and Quality Control
- Defense in Depth
- Defense In Depth Strategy
- Integrate Documentation Into Risk Management
- Configuring Network Security Technologies
General OSINT and Methodology
- First Steps to Getting Started in Open-Source Research
- OSINT Attack Surface Diagrams
- OSINT & The Intelligence Cycle Part I
- OSINT & The Intelligence Cycle Part II
- OSINT & The Intelligence Cycle Part III
- OSINT & The Intelligence Cycle Part IV
- OSINT & The Intelligence Cycle Part V
- UN OHCHR OSINT Guide
- Verification Handbook I
- Verification Handbook II
- Verification Handbook III
- What is OSINT?
Article Publishing Platforms
OSINT CTFs and Quizzes
- Cyber Detective CTF (CTF)
- OSINT-i1 Challenge (Quiz)
- Quiztime Crew (QUIZ)
- SampleCTF (CTF)
- Sector035’s OSINT Quiz (QUIZ)
- TraceLabs CTFs (CTF)
- TryHackMe Geolocating Images Room (CTF)
- TryHackMe Google Dorking Images Room (CTF)
- TryHackMe OhSINT Room (CTF)
- TryHackMe Sakura Room (CTF)
- TryHackMe SearchLight Room (CTF)
- TryHackMe SoMeSINT Room (CTF)
Video Streaming Platforms
Other Ways to Use OSINT
- Europol Trace an Object (Content Warning: Crimes Against Children)
- FBI Endangered Child Alert Program (Content Warning: Crimes Against Children)
- Innocent Lives Foundation
- Sourcing Games
- TraceLabs
OSINT Employment
Domain Specific Resources
Archived or Deleted Content
Businesses
- Brownbook Business Search
- Company Check (UK)
- Endole Business Search (UK)
- National Corporation Directory Search
- Open Corporates
- Quick Company Check (UK)
- US Business Search by State
- USPTO Trademark Search
- US SEC Business Lookup
Collection Tools
- FireShot Addon
- Metaforge
- Open Source Internet Research Tool
- Social Network Harvestor
- Spiderfoot
- Vortimo
Cryptocurrency
- Bitcoin Abuse
- Bitcoin Whos Who
- Bitcoin Block Explorer
- Blockchain Explorer
- DarkBitcoinGraph
- Etherscan Blockchain Explorer
- Etherchain Blockchain Explorer
- FININT Cryptocurrency Start.Me Page
- Fujicoin Blockchain Explorer
- OpenSea OSINT Attack Surface
- Ransomwatch
- Ransomwhere
- Token Sniffer
Cryptography
- How to Extract Information from Public PGP Keys
- MIT PGP Public Key Server
- PGP Help
- PGP Public Key Server
Dark Web
- Ahmia Search
- Fail
- Dark Web OSINT Attack Surface
- Dark Web Resources by OSINTCombine
- Dark Web OSINT Youtube Playlist
- Recon Search (TOR)
- Shodan Darkweb Queries
- The Hidden Wiki
- Tor66 (TOR)
- Torch Search (TOR)
Discord
- DiscordBee
- DiscordHub User Search
- Discord OSINT Attack Surface
- DiscordServers Search
- Discord Snowflake to Timestamp Converter
- Dutch OSINT Guy Discord Resources
Domains, Websites, and Networking
- AnalyzeID
- Central Ops Domain Check
- GreyNoise
- LeakIX
- OpenPhish
- PhishTank
- PublicWWW
- Scamadvisor
- Shodan
- Shodan Darkweb Queries
- Shodan Dorks
- Shodan Geolocation Filters
- Short Links Verification Cheat Sheet
- Tracking All the WiFi Things
- URL Scan
- View DNS
- Virtual Site Mapper
- Website OSINT Attack Surface
- WhatIsMyIPAddress
- Whoxy
- net
- Zone-H Website Defacements
- CentralOPS Email Tool
- Dehashed
- Email OSINT Attack Surface
- OSINT Email Methodology: Part 1
- OSINT Email Methodology: Part 2
- Epieos Email Tool
- HaveIBeenPwned
- Holehe
- MXToolbox Blacklist Check
- MXToolbox Email Headers Tool
- ThatsThem Email Lookup
Gab
Geolocation
- All Area Codes
- A Very Particular Set of Skills
- Descartes Labs
- EarthCam
- Emporis Buildings Database
- Flags of the World
- Geoguesser
- Geolocating photo’s with OSM overpass API
- Google Maps and Streetview
- Google Streetview Coverage
- IEC World Electrical Plugs
- Insecam
- Left vs Right Driving Countries
- MoonCalc
- N2YO Satellite Tracker
- Open Street Map Search Engines
- Overpass Turbo
- Redfin
- Shadow Calculator
- SunCalc
- Trulia
- Wikimapia
- WorldCam
- Zillow
Gettr
Github
Government
Images
- Aperi’Solve
- Baidu Reverse Image Search
- Bing Reverse Image Search
- Pictures
- Depix
- Face++
- id
- Favican Hash Calculator
- FotoForensics
- GIMP
- Google Lens
- Google Reverse Image Search
- Hate Symbols Database
- How to Extract Text from a Face-Down Piece of Paper
- Image Analysis Bookmarklet Tool
- Inkscape
- Jeffrey’s Image Metadata Viewer
- Images OSINT Attack Surface
- Leveraging Street Art in OSINT Investigations
- Logodix
- MyHeritage Photo Enhancer
- Photopea
- PimEyes
- OSINT Combine Reverse Image Analyzer
- Sherloq
- Tineye
- Yandex Reverse Image Search
- What Font Is
- WhatTheFont Font Identifier
- Gramho
- Identifying Followers of a Private Instagram Profile
- Instagram OSINT Attack Surface
- Picuki
- Stories Down
IP
- GreyNoise
- IKnowWhatYouDownload
- Info by IP
- IP Address OSINT Attack Surface
- IP Fingerprints
- IP Void
- Live IP Map
- Mitaka
- Shodan
- Spyse
- ThatsThem IP Lookup
- Tor Exonerator
Languages
- Epieos LinkedIn Tool
- How to conduct OSINT on Linkedin
- LinkedIn OSINT Attack Surface
- LinkedIn OSINT Bookmarket Tools
- LinkedIn OSINT Techniques: Part I
- LinkedIn OSINT Techniques: Part II
- New LinkedIn Search Features
Mastodon
OPSEC
Parler
Person Searches
- com (UK)
- Canada411 (CA)
- Classmates
- Europol Most Wanted
- Find a Grave
- Interpol Red Notice Search
- Interpol Yellow Notice Search
- Melissa Lookups
- Most Common Name by Country
- OFAC Sanctions List
- OpenSanctions
- Person OSINT Attack Surface
- Social Security Number to Location
- Spokeo
- ThatsThem People Search
- The Phone Book BT (UK)
- UK Phone Book (UK)
- US Federal Bureau of Prisons Inmate Search
- US DOJ Sex Offender Public Search
Phone
- Country Calling Codes
- Epieos Phone Tool
- OpenCellid
- Telephone Number OSINT Attack Surface
- ThatsThem Phone Search
Pokémon GO
- PogoMap
- Pokelytics
- Pokémon GO OSINT Attack Surface
- Pokémon GO OSINT Bookmarklet Tools
- Pokémon GO OSINT Techniques: Part I
- Pokémon GO OSINT Techniques: Part II
Programming and Automation
- Build An OSINT Username Search Tool Using SULTAN
- Make Your Own Custom OSINT Bookmarklets: Part I
- Make Your Own Custom OSINT Bookmarklets: Part II
- Python is the Future of OSINT
- Rdddeck
- Reddit Investigator
- Reddit OSINT Attack Surface
- Reddit OSINT Bookmarklet Tools
- Reddit OSINT Techniques
- Snew
- Unddit
Search Engines and Databases
- Acronym Finder
- Boardreader
- City Protect Agencies List
- Dorks Collection List
- Google Dorks Database
- Judy Records (US Court Cases)
- Katana-ds
- Library of Congress
- Project Gutenberg
- IntelX Tool Searches
- SearchCode
- Search Engines Index
- Search Engines of the World
- Shodan Dojo
- UserAgent String Search
- WhatIsMyBrowser
Skype
Snapchat
Sockpuppets
- Art of the Sock
- Creating an Effective Sock Puppet
- Creating Research Accounts for OSINT Investigations
- Developing Profile Photos for Sock Puppets
- From Sock Puppets to Puppet Masters
- Generated Photos
- HOTDRV GAN Face Generator
- If You Follow Me I’ll OSINT You
- Let’s Talk About SockPuppet Accounts
- Sensity Deepfake Detection
- The OSINT Puppeteer
- ThisPersonDoesNotExist GAN Face Generator
- UK-OSINT Tools for Sock Puppets
Telegram
TikTok
Transportation
- Airliners Database
- Airport Webcams
- CarNET
- Airliners Database
- COSINT - OSINT on Cars
- Find By Plate
- FlightConnections
- License Plate Checking (Switzerland)
- Marine Traffic
- Maritime OSINT: Port Analysis
- Metro Logos
- Open Railway Map
- Platesmania
- Rail Cab Rides
- Skyscanner
- Vessel Finder
- Vin Audit
- World License Plates
Tumblr
- me
- Nitter
- Tinfoleak
- Tweet Beaver
- Tweetdeck
- Twitter OSINT Attack Surface
- Spoonbill
- Trendsmap
- TweeterID
Usernames
- Blackbird
- CheckUsernames
- InstantUsername
- KnowEm Username Check
- Maigret
- Name Checkr
- Namech_k
- OSINT Ops: Let me Find your Username
- Sherlock
- Username OSINT Attack Surface
- Username OSINT Youtube Playlist
- User Recon
- org
- WhatsMyName
Virtualization
Visualization
Youtube
Blogs
Communities
- DefCon Recon Village
- OSINT Editor Discord
- OSINT-FR
- OSINTion Discord
- OSINT Subreddit
- Team
- Project Owl Discord
- SearchLight/OSINTCurious Discord
- Tracelabs Discord
Firewalls, IDS And IPS Systems
- Intrusion Detection & Prevention
- Example Of CISCO Intrusion Prevention System
- Installing And Configuring A Firewall
- Load Balancer Configuration
- Installing And Configuring An Intrusion Detection System
- DataLoss Prevention Systems
Analyzing Reconnaissance Threats
- Lesson Introduction
- Way Back Machine
- Using Your Resources
- Using Whois Lookups
- Using DNS To Extract Information
- Assess the Impact of Reconnaissance Incidents
- Variables Affecting Reconnaissance
- Evasion Techniques For Reconnaissance
- Additional Tools
- Finding Your IP Address
- Finding Network Ranges
- Google Hacking
- Mining For Information Using Google Hacking
- Google Hacking Database
- Passive Reconnaissance Using The Internet
- Using What You've Learned....
Cyber Crime Tips And Investigations
- Why Cyber Crime Pays
- Cyber Crime
- Responding To Security Incidents
- Investigating Security Incidents
- Recovering Deleted Data
- Types Of Attacks - Part 1
- Different Attack Types - Part 2
- Cybercrime Statistics: How Much Money are Cybercriminals Making?
- Cybercrime Statistics: The Top Methods of Attack and Related Cybersecurity Concerns
- Only The Rich Can Attain Cyber Crime Justice
- Example Of Cyber Justice
- Social Engineering Attack Troubleshooting
- Hacking In The Entertainment Industry
- The Weakest Link
- Should A CEO Trust a Hacker Over His IT Department
- Peeping Tom – Protecting Pictures on Computers and Cell Phones
- Tracking An Attacker Using Shellbags
- Finding Out What Your Working With On A Network
- Recovering Deleted Data
- Creating A System Image For Forensic Analysis
- Man-In-The-Middle-Attack
- Common Attacks
- Application Attacks
- By Passing The Hash
- Attack Countermeasures - Flooding
- XML Injection
- Clickjacking Threats
- Pivoting Using Windows Remote Desktop
- What Is DoS And DDoS
- DoS Attacks
- Botnets
Social Media Investigation
- Social Media Investigation
- Social Networking Use in Legal Industries Slowly Gaining Momentum
- Social Media Investigations - What You Need To Do Before Getting Started
- How To Use Social Networking To Your Advantage
- How To Create A Sock Puppets - Part 1
- How To Create A Sock Puppets - Part 2
- Social Media Investigation - Quick Tools & Websites For Investigations
- Social Media Attacks & Hacks
- Assuming a New Online Identity
- How To Make Fake Profiles
- Social Media Investigation - Facebook Reference Links
- Social Media Investigation - Tracking A Target On Facebook
- Getting Started With The Dark Web - Part 1
- Getting Started With The Dark Web - Part 2
- The Do's and Don'ts of The Dark Web
- What You Need To Know
- Protecting Your Own Privacy
Password Security
- How People Really Feel About Strong Passwords
- Choosing The Right Password
- Lie, Lie & Lie – Never Tell the Truth When Answering Security Questions
- Passwords And Hashes
- Force Password Changes
- Can Changing Your Passwords Often May Be a Waste of Time
- Resetting Your Password
- Two-Factor Authentication
- Example of 2 Key Authentication using gmail.com
- USB Rubber Ducky - Take Social Engineering to the Next Level
- Password Attacks
- Example Of USB Rubber Ducky
- Using More Than One Email Account
- Securing Your Online Password
- Identity And_Authentication Concepts
- Cracking Passwords Using Software Tools
- Implementing IAM
Pros and Cons Of Web Browsers
- Web Browsers History, Bookmark and Cache Files
- Which Web Browser Is Best For Security
- Important Browsers Files
- How Can I Protect My Browser Files
- How To View Passwords In A Browser
- Clickjacking Threats
Social Engineering
- Overview Of Social Engineering
- Social Engineering
- How To Trace An IP Address
- Social Engineering
- Types of Social Engineering
- Understanding Phishing Scams And Social Engineering
- Phishing And Delivery Media
- Phishing and Common Components
- Duplicate A Website
- Assessing the Impact of Social Engineering
Identity Theft
- Case Study - Personal Security (Identity Theft)
- Case Study - Medical Identity Theft
- Identity Theft - Personal Security
- Identity Theft - Medical Identity Theft
- Identity Theft - Stats
- Case Study - Credit Card Skimming
- Case Study - Criminal Identity Theft
- Case Study - Credit Freeze
- Case Study - ID Theft Recovery
- Identity Theft - Do It Yourself Identity Theft Recovery
- Identity Theft - Tips for Avoiding Online Credit Card Fraud
- Identity Theft - Criminal Identity Theft
- Identity Theft - 5 Types of Credit Card Fraud
- Identity Theft - Internet Security
- Identity Theft - Credit Freeze / Security Freeze
- Identity Theft - How Thieves Can Steal Your Identity
- Identity Theft - Credit Reports
- Robo-Call Fraud
- Phishing Scams
Protector Senior Citizens
- Medicare Fraud, Don't Give them A Chance
- Preventing Medicare Scams
- Watch For The Package On Your Door Step
- Tips On How To Protect Yourself
- Jamaican Lottery Scam
- An Example On How One Man Lost $25k In A Lottery Scam
- How To Avoid A Tech Support Scam
- FBI Destroys Tech Support Scammer's Call Center!
- How To Avoid A Tech Support Scam
- FBI Destroys Tech Support Scammer's Call Center!
- Spotting and Avoiding Tech Support Scams
- What To Do If You Think There’s a Problem With Your Computer
- Reporting Tech Support Scams
Scams & Schemes
- Examples of the Top 10 Internet Scams
- Case Study - Credit Report
- Don’t Open That Email – Spear Phishing
- Phishing Email Scam
- Example - How To Perform A Phishing Attack
- Internet Crime Reports
- Internet Crime Prevention Tips
- Switch-A-Roo
- Watch What You’re Buying
- What Can Go Wrong – Craigslist
- Ebay - Hijacked Accounts
- Hi-Tech Hustling On eBay
- Second Chance Offers
- Partial Refund
- Paid Too Much For An Item
- Shill Bidding
- Hidden Shipping and Handling
- Fake Money Orders and Bad Checks
Cell Phone Security
- Cell Phone Security Overview
- Apple OS vs. Google Android
- Jailbreaking an iPhone
- Password Protect Your Phone
- Having Two Numbers Is Better Than One!
- Did You Download An App With Spyware On Your Android?
- How Do You Protect Yourself From NFC?
- Don’t Trust Your Cell Phone With a Stranger
- Bump & Hack - NFC Hacking
- Protecting Your Android Phone & Tablet
- Cell Phone Hacking
- Voicemail Security
Cyber Bullying
- Fighting Cyber Bullying
- Cyber Bullying - Resources
- Cyber Bullying - Social Media Stats
- Cyber Bullying - Traditional Bullying
- Cyber Bullying - Discrimination Stats
- Case Study - Sexting And Cyber Bullying
- Cyber Stalking - Stalking Using Technology
- Case Study - Cyber Bullying
- Cyber Stalking - Stats
- Cyber Bullying - Workplace Bullying
- Cyber Bullying - Things a School Can Do to Fight Cyber Bullying
- Bullies vs. Cyber Bullies
- Facts & Myths About Bullies and Cyber Bullies
- Case Study - Cyber Bullying Tips | Owning Your Own Name
Child Safety And Security
- Child Safety Stats
- Protecting Our Children
- Case Study - How and Why You Should Install Spyware On Your Kids Computers
- What your Put Out, Is What your Get Back
- Stop Trying To Get Likes, Before It Kills You!
- Watch Who You Call A Friend
- Nerds Rule The World
- Beware Of Child Predators
- Cyber Bullying VS Bullying
Surveillance Countermeasures (TSCM)
- Need-to-Know Definitions
- What Is Surveillance?
- What Is Bug Sweeping And TSCM?
- When Is Surveillance Used?
- Common Types of Surveillance
- Surveillance Methods
- Why Conduct Surveillance?
- How Surveillance Works
- What Is Electronic Surveillance?
- Why Use Electronic Surveillance?
- Is Electronic Surveillance Legal?
- Computer and Mobile Phone Surveillance
- Am I Under Electronic Surveillance?
- What Can I Expect From An Investigator Specializing In Electronic Surveillance?
- Computer Surveillance - What Does It Offer?
- What Is Computer Surveillance?
- Who Can Use Computer Surveillance?
- How To Perform A Sweep
- Eavesdrop Countering Devices
The Dark Web
- Inside The Dark Web
- Tor And Anonymizers
- How To Buy Products On The Dark Web
- The Difference Between The Internet And The Dark Web
- How To Access The Dark Web
- Who Created the Dark Web?
- Is It Really Anonymous?
Becoming A Hacker
- The 5 Stages Of Computer Hacking - Part 1
- The 5 Stages Of Computer Hacking - Part 2
- The Top 5 Places That People Think Will Never Be Hacked
- Network and System Scanning Methods
- Performing Reconnaissance on a Network - Part 1
- Performing Reconnaissance on a Network - Part 2
- Vulnerability Scanning
- Enumeration Methods
- Enumeration Techniques
- How To Get Usernames And Passwords Across The Network
- Download Wireshark
- Capturing and Analyzing Data with Wireshark
- Using Nessus
- View The Nmap Manual
- Overview Of Nmap
- Implementing Penetration Testing
- Host Fingerprinting Using Software Tools
- Configure Vulnerability Scanners
Hacking With Hardware
- The Easiest Why To Hack, Audit And Test Physical Access
- Introducing the WiFi Pineapple
- WiFi Pineapple Primer - From Recon to PineAP
- Shark Jack
- The Power Of The Shark Jack
- The Packet Squirrel
- Using The Packet Squirrel
- LANTurtle
- How To Use The Lan Turtle
Cryptography
- History Of Cryptography
- Types Of Cryptography
- Public Key
- Certificates
- Hashing
- AES, DES And DES
- SSL and TLS
- SSH
- Disk Encryption
- Cryptographic Analysis
- Cryptanalysis Techniques
- Hashing And Symmetric Cryptographic Algorithms
- Identifying Asymmetric Cryptographic Algorithms
Personal Computer Security
- 12 Signs A Personal Computer Has Been Hacked
- Principles Of Cybersecurity
- Principles Of Cybersecurity
- Microsoft Windows Security
- How To Secure Windows 10
- Security Mac OS
- Don’t Trust Your Neighbor’s Wi-Fi
- Internet Security
- Top 10 Secure Computing Tips
Wireless Networking
- Wireless Networking
- Encryption - WEP, WPA And WPA
- Finding Hotspots
- Breaking WEP Encryption
- Rogue Access Points And Attacks
- Wireless Sniffing
- Protecting Wireless Networks
Web Application Hacking
- What Is Web Application Testing
- Web Application Architecture
- Web Testing Tools
- Cross Site Scripting
- SQL Injection
- Cross Site Request Forgery
- Session Hijacking And Attacks And Cookies
Learn To Make A Lucrative Career In Cyber Security
- PART 1 - Learn To Make A Lucrative Career In Cyber Security
- Part 2 - Learn To Make A Lucrative Career In Cyber Security
Certification
