Placing the Suspect Behind the Keyboard online course

My newest course is out and it is the best course you will find on the topic.  More than 12 hours of investigative methods and effective techniques to build a case against criminals who use technology to commit crimes.  

  • Learn the methods to track criminals online and in the real world
  • Learn the tricks of the trade (tradecraft) of covert communications and breaking those communications
  • Learn how to build a case that would not have been closed without this course
  • Learn the one thingI that will give you the tools to become not only a great forensicator, but someone that can place a suspect behind the keyboard

Placing the Suspect Behind the Keyboard was the first digital forensics book focusing on building a good case on criminals who use technology to commit crimes. This also the first course teaching that specific topic.  My intention with this online course is to put you into the mindset of someone working toward identifying the suspect, gathering evidence on the suspect, and proving allegations against your suspect; in effect, placing the suspect behind the keyboard.


If your career has been like mine, most cases are fairly straightforward. Perhaps a suspect was already identified and most of the evidence already seized.  In many cases, whether it is a criminal arrest or being hired as a private consultant, generally, you start with all you need to begin examining the media.  But if your career is like mine, there have been a few cases where that is simply not the case.  This course is not only for the easy cases, but especially for the tough ones.Holistically, this course covers everything you need, whether working in the private or public sector.  Investigative techniques are discussed for both sectors as many methods can be used in both case types.  A few sections are LE-only simply because citizens cannot wiretap other citizens (as an example), however, you can see the differences between a method used by law enforcement and the private sector.  Practically speaking however, the actual methods are the same.  A forensic analysis of a flash drive in a criminal case is not different than in a civil case, nor are the methods to tie a person to a device different.

This course is not just for the average case, but developed especially to address the difficult cases.

Cases where the suspect has not been identified.  Cases where the electronic evidence has not been seized.  Cases where there are many suspects.  Cases where the evidence linking the suspect to the device or crime is weak at best.  For those cases, you need to take extra measures, think out of the box, and use everything at your disposal.  You have to work at putting the suspect behind the keyboard, because if you don’t, it won’t happen. 

Don’t let your case go to the cold-case files.  Solve it!  This course shows you how to do it.  The books detail even more on how to put cases together, especially the really difficult cases where you have little to go.  As for incident response cases (breaches), this is not a course on mitigating a breach, or tracking hackers in cyberspace.  Although, many of the methods will work for just that.   Incident Response can benefit greatly for the sake of sometimes the suspect in a breach must be caught for a variety of reasons.  This course and books brings it to you.

The Placing the Suspect Behind the Keyboard online course uses the same material as the 2-day workshop with the biggest difference being not working actual cases in class.  As a side note, in a previous class, a suicide case was reopened as a potential homicide case based on course methods in the class!  The methods are proven to work.

FAQ:

Is there a discount for a bulk order?

With 50%, two free books, and free access to the X-Ways Forensics Practitioner's Guide course, there are no bulk discounts.

My agency/company will take a week or two to get approval to pay.  Can the discount be extended?

Send me an email at This email address is being protected from spambots. You need JavaScript enabled to view it. and let me know.  I can extend to get approval, but not for too long.

Will there be another promotion after this one?

Most probably, but it won't be (1) 50% off, and (2) may not include the two books, and (3) most likely won't include access to the X-Ways Forensics Practitioner's Guide course.  This is the best time to get both courses and both books at this price.

Anonymity: Criminals are only as good as their las...
The 2 Worst Games to Play in #infosec
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 23 August 2017