The promotion code psbk-100 is not valid for this course. ×
Placing the Suspect Behind the Keyboard

Placing the Suspect Behind the Keyboard

How to catch criminals who use technology to hide their crimes and identity

About this course

Learn both innovative and traditional techniques to investigate computer-facilitated crimes with the objective of placing the suspects behind the keyboard.  This workshop integrates both cyber investigations (forensics) and traditional investigation methods into a complete process of working criminal investigations by thinking inside and outside the CPU.  

 I designed this course for general investigators (both LE and PI), cyber security professionals (digital forensics, incident response), and attorneys litigating computer-related incidents.  Knowledge of digital forensics or software is not required to complete the course, however, digital forensic topics and processes will be demonstrated in portions of the course such as showing how computer trace activity can be used to help tie electronic evidence to specific persons. There is no other course available anywhere that specifically targets the most important aspects of any computer-related investigation: Placing the Suspect Behind the Keyboard.

Become that kind of investigator.  The kind that can work a case like no one else.

The methods described in this course are the same methods used and taught by law enforcement, intelligence agencies, and private investigators around the globe.  Although no single method is classified, this course combines the most innovative and traditional methods into one cohesive training course.  You won't find any course like this anywhere that the focus is placing the suspect behind the keyboard.  If you want to learn how to put a case together with the intention of identifying and convicting the suspect, this is your course.  Most methods work identically in civil and internal corporate matters as they do in criminal and national security investigations (law enforcement-only methods include wiretaps, which is covered in the course too).

Attribution is key.

You are only doing half a job if you aren't working toward solving your case.  Simply going through the numbers to recover data and find evidence is not doing your cases justice.  Victims deserve justice with you finding the hackers, the corporate thieves, and common criminals victimizing society.  You also deserve the knowledge and skills to do your job.  Whether your goal is to supervise a case, work a case, or try a case, the goal is the same: shine a light on the truth with the big picture. 

The tools are here.

The tools to accomplish your case objectives are referenced throughout the course.  Freeware, open source, and commercial options based on your needs.  The methods and tools described in this course, along with your motivation, will jumpstart your investigations as if on fire.   You will learn enough techniques and processes that will save you hundreds of hours of work along with the goal of tracking your suspect.

FAQ

How long do I have to complete the course?

You have a full year to access the course online.

Do I need any hardware or software during the course?

All you need is a device with Internet access.

Can I review lessons more than once?

During the year, you can return to any lesson as often as you like.

Will I receive any certificate of training?

Upon completing every lesson, you will receive a printable certificate of training that can also be linked on your Linkedin page.

Does this course really teach how to place a suspect at the keyboard?

You bet.  No other course covers this much material solely focused on doing just that: placing the suspect behind the keyboard.

Is this for law enforcement only?

No. The course was designed for anyone tasked in any duties related with electronic crimes.  Investigators (public and private sector) learn how to uncover evidence and make a case, attorneys learn how the evidence in these cases can be gathered to use in case strategies, and students get a head-start of learning the street smarts and gumshoe detective work of actually tracking a suspect, gathering evidence, and making a great case.  

In this course, you learn to think within the CPU just as much as thinking outside the CPU.

 **Finally.  ALL BOOKS ARE SHIPPED OUT (only for those who purchased the special promos and indicated they wanted the books)!   

Sorry for the delay.  Lots of books....lots of orders.    

**Books included in special promotions only**

Turn "I know you did it" into "I know you did it and I can prove it."

About your instructor:

Brett Shavers is the author of the Syngress books Placing the Suspect Behind the Keyboard and Hiding Behind the Keyboard.  Brett has nearly 15 years of law enforcement experience and training as an undercover narcotics officer, task force officer, police officer, SWAT member, and more than a decade of conducting more digital forensics cases than can be remembered in both the public and private sectors.  

Brett's practical experience includes having solved felonies (including murders), tying individuals to computer activity, conducting thousands of hours of surveillance, hundreds of interviews for hundreds of crimes, testifying as as court qualified forensic expert, and teaching hundreds of law enforcement officers in high tech crime investigations, criminal procedure, and undercover methods.  Brett's investigative experience includes international investigations into drug trafficking organizations, terrorist cells, child pornography distribution organizations, money laundering groups, human trafficking organizations, and gun trafficking crimes.

Curriculum

  • Introduction
  • Introduction
  • Attribution
  • Attribution
  • Intelligence
  • Investigative Mindset
  • Evidence Concerns
  • Evidence Concerns (and tips!)
  • Interviews
  • High Tech Interviews
  • It is more than just a computer
  • Physical Investigations
  • Physical Surveillance
  • Mobile Surveillance
  • Static Surveillance
  • Surveillance Wrap Up
  • Undercover Operations
  • Informants
  • Electronic Surveillance & Intercepts
  • Compiling Identity
  • Compiling Identity
  • Geolocation
  • Geolocation Data Sources
  • Online Investigations and Open Source Information
  • OSINT Intro
  • OSINT Search Engines
  • OSINT Google Hacks
  • OSINT Scope Creep
  • OSINT Crowd Sourcing
  • OSINT Public Records
  • <BONUS> OSINT Family Safety
  • OSINT HoneyPots
  • OSINT Internet Marketplace
  • OSINT Metadata Online
  • OSINT Avoiding Pitfalls
  • OSINT Example Person Search
  • OSINT Information Management Tips
  • OSINT References and Tools
  • The Anonymous Internet
  • Tor - The Onion Router
  • Tor Forensics
  • Compromising Tor
  • Tor Hidden Services
  • Tor Notes
  • Computer User Activity
  • Attributing computer activity
  • Covert Communication Methods
  • Identifying and breaking covert communications
  • Cryptology and Steganography
  • You don't know what you don't know
  • Tracking Hackers and Incident Response
  • Tracking Hackers and Incident Response
  • Anti-forensics/counter-forensics techniques
  • What to do when you are plotted against by a suspect
  • Data Visualization for Digital Forensics
  • Introduction to Data Viz
  • Data Viz - Tools
  • Data Viz - The Basics
  • Data Viz - Link Analysis & Geolocation
  • Data Viz - Timelines
  • Working Alone vs Working with Others
  • No investigator is an island
  • Case Studies
  • Case Studies
  • Reporting
  • Report Writing
  • Putting it All Together
  • Putting it All Together
  • Conclusion
  • Further resources
  • Crazy Stuff

About this course

Learn both innovative and traditional techniques to investigate computer-facilitated crimes with the objective of placing the suspects behind the keyboard.  This workshop integrates both cyber investigations (forensics) and traditional investigation methods into a complete process of working criminal investigations by thinking inside and outside the CPU.  

 I designed this course for general investigators (both LE and PI), cyber security professionals (digital forensics, incident response), and attorneys litigating computer-related incidents.  Knowledge of digital forensics or software is not required to complete the course, however, digital forensic topics and processes will be demonstrated in portions of the course such as showing how computer trace activity can be used to help tie electronic evidence to specific persons. There is no other course available anywhere that specifically targets the most important aspects of any computer-related investigation: Placing the Suspect Behind the Keyboard.

Become that kind of investigator.  The kind that can work a case like no one else.

The methods described in this course are the same methods used and taught by law enforcement, intelligence agencies, and private investigators around the globe.  Although no single method is classified, this course combines the most innovative and traditional methods into one cohesive training course.  You won't find any course like this anywhere that the focus is placing the suspect behind the keyboard.  If you want to learn how to put a case together with the intention of identifying and convicting the suspect, this is your course.  Most methods work identically in civil and internal corporate matters as they do in criminal and national security investigations (law enforcement-only methods include wiretaps, which is covered in the course too).

Attribution is key.

You are only doing half a job if you aren't working toward solving your case.  Simply going through the numbers to recover data and find evidence is not doing your cases justice.  Victims deserve justice with you finding the hackers, the corporate thieves, and common criminals victimizing society.  You also deserve the knowledge and skills to do your job.  Whether your goal is to supervise a case, work a case, or try a case, the goal is the same: shine a light on the truth with the big picture. 

The tools are here.

The tools to accomplish your case objectives are referenced throughout the course.  Freeware, open source, and commercial options based on your needs.  The methods and tools described in this course, along with your motivation, will jumpstart your investigations as if on fire.   You will learn enough techniques and processes that will save you hundreds of hours of work along with the goal of tracking your suspect.

FAQ

How long do I have to complete the course?

You have a full year to access the course online.

Do I need any hardware or software during the course?

All you need is a device with Internet access.

Can I review lessons more than once?

During the year, you can return to any lesson as often as you like.

Will I receive any certificate of training?

Upon completing every lesson, you will receive a printable certificate of training that can also be linked on your Linkedin page.

Does this course really teach how to place a suspect at the keyboard?

You bet.  No other course covers this much material solely focused on doing just that: placing the suspect behind the keyboard.

Is this for law enforcement only?

No. The course was designed for anyone tasked in any duties related with electronic crimes.  Investigators (public and private sector) learn how to uncover evidence and make a case, attorneys learn how the evidence in these cases can be gathered to use in case strategies, and students get a head-start of learning the street smarts and gumshoe detective work of actually tracking a suspect, gathering evidence, and making a great case.  

In this course, you learn to think within the CPU just as much as thinking outside the CPU.

 **Finally.  ALL BOOKS ARE SHIPPED OUT (only for those who purchased the special promos and indicated they wanted the books)!   

Sorry for the delay.  Lots of books....lots of orders.    

**Books included in special promotions only**

Turn "I know you did it" into "I know you did it and I can prove it."

About your instructor:

Brett Shavers is the author of the Syngress books Placing the Suspect Behind the Keyboard and Hiding Behind the Keyboard.  Brett has nearly 15 years of law enforcement experience and training as an undercover narcotics officer, task force officer, police officer, SWAT member, and more than a decade of conducting more digital forensics cases than can be remembered in both the public and private sectors.  

Brett's practical experience includes having solved felonies (including murders), tying individuals to computer activity, conducting thousands of hours of surveillance, hundreds of interviews for hundreds of crimes, testifying as as court qualified forensic expert, and teaching hundreds of law enforcement officers in high tech crime investigations, criminal procedure, and undercover methods.  Brett's investigative experience includes international investigations into drug trafficking organizations, terrorist cells, child pornography distribution organizations, money laundering groups, human trafficking organizations, and gun trafficking crimes.

Curriculum

  • Introduction
  • Introduction
  • Attribution
  • Attribution
  • Intelligence
  • Investigative Mindset
  • Evidence Concerns
  • Evidence Concerns (and tips!)
  • Interviews
  • High Tech Interviews
  • It is more than just a computer
  • Physical Investigations
  • Physical Surveillance
  • Mobile Surveillance
  • Static Surveillance
  • Surveillance Wrap Up
  • Undercover Operations
  • Informants
  • Electronic Surveillance & Intercepts
  • Compiling Identity
  • Compiling Identity
  • Geolocation
  • Geolocation Data Sources
  • Online Investigations and Open Source Information
  • OSINT Intro
  • OSINT Search Engines
  • OSINT Google Hacks
  • OSINT Scope Creep
  • OSINT Crowd Sourcing
  • OSINT Public Records
  • <BONUS> OSINT Family Safety
  • OSINT HoneyPots
  • OSINT Internet Marketplace
  • OSINT Metadata Online
  • OSINT Avoiding Pitfalls
  • OSINT Example Person Search
  • OSINT Information Management Tips
  • OSINT References and Tools
  • The Anonymous Internet
  • Tor - The Onion Router
  • Tor Forensics
  • Compromising Tor
  • Tor Hidden Services
  • Tor Notes
  • Computer User Activity
  • Attributing computer activity
  • Covert Communication Methods
  • Identifying and breaking covert communications
  • Cryptology and Steganography
  • You don't know what you don't know
  • Tracking Hackers and Incident Response
  • Tracking Hackers and Incident Response
  • Anti-forensics/counter-forensics techniques
  • What to do when you are plotted against by a suspect
  • Data Visualization for Digital Forensics
  • Introduction to Data Viz
  • Data Viz - Tools
  • Data Viz - The Basics
  • Data Viz - Link Analysis & Geolocation
  • Data Viz - Timelines
  • Working Alone vs Working with Others
  • No investigator is an island
  • Case Studies
  • Case Studies
  • Reporting
  • Report Writing
  • Putting it All Together
  • Putting it All Together
  • Conclusion
  • Further resources
  • Crazy Stuff