Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Transnational Cyber Intelligence-Driven Cybercrime and Crimeware Analyst
Introduction - Standard OPSEC - OSINT for Cybercrime and Crimeware
Introduction (6:16)
OPSEC and OSINT (112:37)
Personas - Rules of Engagement - OPSEC for Cybercrime and Crimeware (169:43)
Adaptive Cyber Intelligence Lifecycle for Cybercrime (10:03)
A Few More OSINT Tools (15:25)
Suggested Reading Assignment
ChatGPT Setup (32:41)
Cryptocurrency OSINT Tools (32:34)
Start Building and Enhancing Your Program - Stakeholder Analysis
Stakeholder Analysis - Tracking (33:24)
Strategic Intelligence Analysis - Stakeholder Analysis II (105:36)
Case Study Suggestion
Course Case Study
Data Provenance - Hunchly
Hunchly (55:47)
Speed Reading and Collection Management - Lifecycle Skills
Speed Reading and Collection Management (71:27)
Reading Assignments
Source Evaluation - Review and Update /// Collection Management - Review and Update (78:41)
Supporting Documents
STEMPLES Plus - Indicators of Change - Hofstede Principles
Strategic STEMPLES Plus - Assignment - Templates - Examples (58:45)
STEMPLES Plus for Cybercrime with Indicators of Change (49:46)
Hofstede Principles Adopted for Transnational Cybercrime (91:41)
Reading Assignments
The Cultural Nexus Framework (33:15)
Adversary Targeting - Baseline and Targeted
Adversary Targeting - Cyber Intel Baseline (37:02)
Adversary Targeting - Cybercrime (102:00)
Adversary Targeting - Cybercrime II (34:23)
Case Study 1 - Simulation 1
Transnational Crime, Hybrid Warfare, and the Instructional Framework for Operational Intelligence
Introduction (7:26)
Cyber Financial Crime in Hybrid Warfare (37:50)
Hybrid Threats – Cybercrime and Physical Sabotage (48:18)
Strategic Disruption of Criminal-State Alliances (138:26)
The Intersection of Cybercrime and Terrorism (56:14)
Quantum Computing in Cybercrime Plus (16:50)
Case Study 2 - Simulation 2
Analysis of Competing Hypothesis - ACH
Standard ACH (30:01)
ACH for Cybercrime and Crimeware (110:37)
Structured Analytic Techniques
Structured Intelligence Techniques - Lectures (127:11)
Readings - Tools - Technique How To's
SATS in Investigations - Cryptocurrency (48:46)
SATS for Cybercrime and Crimeware (49:07)
Additional Videos on Structured Analytic Techniques (20:33)
Quiz
What are they and how to use them - Pherson 9 (26:29)
Treadstone 71 Created Advanced Structured Analytic Techniques (59:33)
Critical Thinking
Structured Critical Thinking for Transnational Cybercrime and Crimeware Analysis (44:05)
Reading Assignments
Standard Cognitive Bias and Fallacy Analysis - Transnational Cybercrime Cognitive Bias and Fallacies
Transnational Cybercrime Cognitive Bias and Fallacy Analysis (90:57)
Reading Assignments
Types of Analysis
Types of Analysis - Transnational Cybercrime (35:14)
Suggested Readings
Case Study 3 - Simulation 3
Elicitation - Interviews and Online
Lecture and Playbook (51:26)
Insider Threat Capability Maturity Model
Insider Threats - Traditional (87:46)
Insider Threats - with AI - CMM Plus (220:30)
Analytic Writing Part 1
Analytic Writing for Transnational Cybercrime and Crimeware (51:25)
Case Study 4 - Simulation 4
S.P.E.A.R. (80:09)
Reports and Reporting Standard and Transnational CyberCrime
Transnational Cybercrime Reports and Briefs - Methods & Templates (92:46)
The Cultural Nexus Framework
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock