• Online, Instructor-Led
  • Online, Self-Paced
Course Description

This course educates law enforcement officers on how to think like hackers as well as how to identify the tools that hackers use to commit attacks. This course has been used in training Local, State and Federal Law Enforcement such as FBI, DEA, ATF, IRS, US Marshals, US Air Marshals, Homeland Security, Inspector General's Office to just name a few.

Learning Objectives

  • Law Enforcement and Personal Social Media Accounts
  • What Your Family Members Can Do That Can Get You in Trouble
  • Rules to Dating Online
  • Buying Homes and Cars in Your Name
  • Learn How to Use and Configure the Web Data Extractor Tool
  • Learn How to Extract Phone Numbers From a Target Website
  • Learn How to Extract Fax Numbers From a Target Website
  • Learn How to Extract Email Addresses From a Target Website
  • Learn How to Find Every URL on a Target Website
  • How to Get Usernames From a Website Without Hacking
  • How to Get Passwords From a Website Without Hacking
  • How to Get Email Lists/Addresses From a Website Without Hacking
  • How to Get Sensitive Documents From a Website Without Hacking
  • How to Get Financial Information From a Website Without Hacking
  • Find a Website's vulnerabilities
  • Monitor Any Website
  • How to Bypass the Google Custom Search Filter to Access all of Google's Databases
  • How to Search all of Google at Once for Vulnerabilities
  • How to Search Specific Websites for Vulnerabilities
  • How to Add a Proxy to Hide Where Your Searches Originate From
  • How to Determine if There are Any Hidden or Restricted URLs in a Website
  • How to Scan Files You Have Downloaded for Personally Identifiable Information Such as Credit Card Numbers, Social Security Numbers, and Patient Records
  • How to Use Google to Scan for Websites With Open Ports
  • How to Use "NotInMyBackyard" to See if Someone's Name, Username, Social Security Number, or Any Other Personally Identifiable Information Has Been Posted on a Public Website or Into Cloud Storage
  • How to Look for a Malicious Executable File in Websites
  • Learn How to Find the List of IPs That a Target Website is Using
  • Learn How and Why to Use the Wayback Machine to View Old Copies of a Website
  • Use the Netcraft Tool to Find all URLs in a Target Website and What Operating Systems the Website Uses
  • How to Discover Which of Your Devices are Connected to the Internet, Where they are Located and Who is Using Them
  • Keep Track of all the Computers on Your Network That are Directly Accessible From the Internet
  • Learn How to Understand a Target's Digital Footprint
  • Learn How to Find Every URL on a Target Website
  • Learn How to Mirror a Website
  • Learn How to Configure the Settings for Maximum Data Gathering
  • Learn What you Can do With a Mirrored Website
  • How to Find Almost Anyone in the World Online
  • How to Build Fake Profiles to Create a New Social Media Profile or Cyberspace Identity
  • How to Create Sock Puppets/Fake Accounts
  • How to Tell the Difference Between Real News and Fake News
  • How People Create Fake News
  • How to Track an Email Legally Without a Subpoena
  • How to Spoof Emails Without Any Special Software
  • How to Track a Cyber-Criminal Via Skype
  • Five Ways Credit Card Thieves Steal Credit Card Numbers Without Getting Caught
  • How to Clone Credit Card Numbers in Minutes
  • Where Thieves Browse Online to Buy, trade, and Sell Credit Cards
  • How to Profile an Employee of a Company who is Stealing Information
  • How to Tell if a Crime is an Inside Job
  • What Are the Top 5 Hacker for Hire Requests From Consumers and Businesses
  • Who is Requesting the Most Services
  • The Top 5 countries That are Hiring Hacker for Hire Services
  • Why Should Law Enforcement Team Up With Hacker for Hire Service
  • How Criminals Use Spoof Email to Check Voicemails
  • How Criminals Spoof Telephone Numbers
  • How Criminals Make Untraceable Telephone Calls
  • Identifying Telephone-Spoofing Companies and Which Ones are Law Enforcement Friendly
  • What Law Enforcement Needs to Know About Issuing a Subpoena to a Spoofing Company
  • The Booming Industry of Sex Trafficking Via the Internet
  • How International Agreements Address the Problem and Fail to Go Far Enough
  • Investigating Sex Trafficking on Facebook
  • Sextortion
  • The Mistakes Every Boss Makes
  • What Your IT Department Will Never Tell You
  • The Top 10 Things that Prove if You and/or Your Organization is Hacker Proof

Framework Connections