DouSpen

Online courses on cryptocurrency security

Safe Cryptocurrencies: Online Investigation Practices

Safe Cryptocurrencies: Online Investigation Practices
Safe Cryptocurrencies: Online Investigation Practices

The program “Secure Cryptocurrencies: Practicing Online Investigations” is designed to build competencies and skills in working with digital non-fiat assets. The course allows you to immerse yourself in the specifics of information security specialists investigating cyber incidents (working with various analytical tools) and learn how to reasonably make both short-term decisions on a particular case (guided by the principles and techniques of technical analysis) and organize methodological work, developing their own approaches in accordance with the specifics of activity, based on global trends.
No special knowledge is required for the course, but basic knowledge of computers and computer networks, mobile technologies and communication services, social networks, shadow Internet, e-commerce will be welcomed.

Description

The main goal of the course is to teach the theoretical foundations and practical skills necessary for a specialist to identify the risks associated with the use of cryptocurrencies and to communicate with the main participants in the industry.
Successful mastering of the course will allow the student to understand the peculiarities and regularities of functioning of the cryptocurrency market and the work of its participants, assess trends in the use of cryptocurrencies for criminal purposes, gain skills to select, install and configure software designed to use cryptocurrencies and analyze cryptotransactions.
The course is designed for people interested in investing in blockchain projects, as well as paying attention to information security issues.
The course structure is designed to help both information security specialists and novice investors get a comprehensive understanding of the ways to enter the cryptocurrency market, intermediaries and risks associated with illegal activities.
Course objectives: – to study the features and trends of the global market of cryptocurrencies and their use in criminal activities at the current stage of economic globalization; – to characterize digital technologies that ensure the confidentiality of market participants; – to provide students with skills to use hardware and software cryptocurrencies; – to familiarize them with the tools used by government agencies and commercial companies to investigate computer incidents; – to familiarize students with the basic.

Target audience

Specialists in the field of information security.

Program

Module 1. Blockchain and Cryptocurrencies

Topic 1: History and Types of Cryptocurrencies

  • Bitcoin,
  • Ethereum,
  • Dash,
  • Monero

Topic 1.2 How to get cryptocurrency

  • Cloud mining.
  • Classic mining.
  • Buying cryptocurrency

Theme 1.3 How to store cryptocurrency

  • Types of wallets.
  • Hardware wallets: pros and cons.
  • Hardware wallets: devices.
  • Hot wallets: pros and cons.
  • Hot wallets: apps.
  • Exchange – not a wallet.

Topic 1.4 How cryptocurrency is lost

  • Damaged files (flash drive).
  • Password loss or theft.
  • Forgetfulness.
  • Death of the owner.

Topic 1.5 How and where to buy cryptocurrency

  • Cryptocurrency exchanges.
  • Decentralized exchange Bisq.
  • Hodl Hodl trading platform.
  • Online exchangers.
  • Buying through an exchanger – practical part.
  • Telegram-bots.
  • Telegram-bots – practical part.
  • Bitcoin terminals.
  • Buying from the owner.
  • LocalBitcoins platform: transactions at the meeting.
  • Exchange for gift cards.
  • Exchange for game currencies. FAQ: what method to choose.

Topic 1.6 How and on what to spend cryptocurrency.

  • Buying expensive products.
  • Buying real estate.
  • Buying cryptocurrency cards.
  • Intermediate testing.

Module 2: Identifying Bitcoin Transactions

Topic 2.1 What’s outside the blockchain

  • Looking for a wallet on the Internet.
  • Know your customer or mandatory identification of digital currency owners.
  • Stores and online marketplaces how to buy goods and services.
  • Using the “thin” client – online wallets under scrutiny.
  • Provider or SORM – what is visible in traffic without network protection.

Topic 2.2 What’s in the blockchain

  • Transaction ID – the main clue.
  • Time stamps and active time zones.
  • Wallet address – inputs, outputs, balance – evolution of formulas.
  • Source of funds – inputs, outputs and exchanges.
  • Transaction graph – history of digital asset relationships.
  • Clustering – surrender and time heuristics.
  • Risk assessment – owners of labeled assets.
  • Visualization – visual schemes of relations.

Theme 2.3 Transaction analysis tools

  • Top 15 blockchain observers.
  • Blockchain.com Observer.
  • Sochain Observer.
  • CryptoHound observer.
  • BitPay insight observer.
  • OXT Observer.
  • Token View Observer.
  • Blockcypher Observer.
  • Blockstream Bitcoin Explorer.
  • Cryptocurrency Alerting Observer.
  • Sonm Blockchain Explorer.
  • SpectroCoin Explorer.
  • CoinMarketCap’s Block Explorer.
  • Seiza Blockchain Explorer.

Topic 2.4 Digital Transaction Software Analysis Tools.

  • Phyton Suite,
  • BlockExplorer and Webhose.io.
  • Orbit set – history, graphs, suspicious connections.

Intermediate testing.

Module 3. Methods of cryptocurrency hiding

Topic 3.1 Cryptocurrency properties.

  • Anonymity and untraceability.

Topic 3.2 Transaction graph obfuscation methods

  • Lightning Network technology – fast payments.
  • CoinJoin or simple entanglement.
  • Chaumian CoinJoin – operator and blind signature.
  • CoinShuffle – organized group of individuals.
  • Confidential Transactions – hidden amounts.
  • Ring Confidential Transactions – ring signatures.
  • Stealth Addresses – an open address.

Topic 3.3 Bitcoin Mixer.

  • What is a bitcoin mixer.
  • Procedure of cryptocurrency mixing.
  • Problems of cryptocurrency mixers.

Topic 3.4 Popular bitcoin mixers.

  • Bitcoin mixer BitMix.Biz.
  • Bitcoin mixer Mixer.money.
  • CryptoMixer.
  • Helix Bitcoin Mixer.
  • Bitcoin mixer Bitcoin Blender. Intermediate testing.

Module 4. Analysis of international experience in counteracting illegal transactions with digital assets

Topic 4.1 Cryptocurrency crime and anti-money laundering.

  • Major trends.
  • Basic law enforcement measures.
  • Theft and fraud in the pandemic.
  • Rapid development of international law.
  • Sanctioning countries.

Topic 4.2 Global Risks: Digital Asset Provider Jurisdictions or Know Your Customer.

An overview of regional requirements.

Topic 4.3 Following dirty money.

  • Overview of money laundering.
  • Reducing the risks of money laundering.

Topic 4.4 State of the Art of Crypto-crime.

  • Money laundering.
  • Fraud.
  • Cryptojackers.
  • Shadow Internet markets.
  • Terrorism financing.

Intermediate testing.

Module 5. Complex analysis systems for cryptocurrency transactions

Topic 5.1 Functions of cryptocurrency analysis systems

  • Transactions monitoring.
  • Monitoring and tokenization of wallets.
  • Signaling.

Theme 5.2 Scope of application of cryptocurrency analysis systems.

  • Law enforcement activity.
  • Commercial activity.

Theme 5.3 Governmental systems of cryptocurrency analysis

  • International blockchain alliance.
  • USA: “In Search of Monero”.
  • Europe: “TITANIUM”.

Topic 5.4 Commercial systems of cryptocurrency analysis

  • Chainalysis.
  • Coinbase Analytics (formerly Neutrino).
  • Crystal Blockchain.
  • CipherTrace. Traceer.
  • Elliptic (UK).
  • Blockchain Evidence Locker (Leonovus Company/Canada).
  • Longhash. BitCluster.

Intermediate testing

Final testing