Cryptocurrency Investigator - Foundation Course

40 Hours / 5-Day

This Cryptocurrency Foundation Course for Investigators is a hands-on practical 5-Day training program designed for investigators who want to advance their knowledge of bitcoin, the blockchain, cryptocurrency, and its criminal applications.

InquireRegister for an upcoming class

Introduction and Tools Used on the Course

      This Cryptocurrency Foundation Course for Investigators is a hands-on practical 5-day training program designed for investigators who want to advance their knowledge of bitcoin, the blockchain, cryptocurrency, and its criminal applications.
      For criminals, cryptocurrency is the ideal method to launder proceeds of illegal activities, used for money-laundering, tax evasion, drug trafficking, and extortion. Today’s investigator must be experienced in the basics of Cold Storage, BIP38, BIP39 and transferring cryptocurrencies during the execution of a search warrant from a suspect’s wallet to their agency owned wallet.
      Law enforcement, intelligence analysts, and investigators will practice cold storage, learn why it matters, name the different types of cold storage options, and create their own public and private keys without connecting to the internet or any other network. The course will teach how to establish an agency owned cryptocurrency wallet before the execution of a search warrant. After that, investigators will go through several exercises and practice the transfer of cryptocurrencies from a suspect’s wallet to their agency owned wallet.
      Students will learn about a variety of private key hiding places, see examples of “hidden in plain sight” private keys and practice a search of a hidden private key in plain sight.
      Attendees will know the purpose and functionality of typical crypto exchanges and visit several exchanges.
      Participants will understand the similarities and differences between and ICO and an IPO, articulate how cryptocurrencies are launched and discuss the process of a pump and dump scheme. Students will gain knowledge about coins and tokens, describe how tokens gain value and differentiate between utility tokens and security tokens.
      Course participants will become proficient in Bitcoin and Altcoin basics, the Blockchain, cryptocurrencies wallets, exchanges, transactions, and do hands-on exercises on the five most common Hardware Wallets.

Course Topics

      • What is Bitcoin?
      • What is Bitcoin?
      • What are Altcoins?
      • What are Forks?
      • ICO Process.
      • What are Tokens and how to create them?
      • Learn about the five most common Hardware Wallets.
      • Practice Hardware Wallet Setup,
      • Wipe and Recovery on the 5 most common Wallets.
      • Learn how to use a Hardware Wallet.
      • What is a Paper Wallet?
      • Learn how to create a Paper Wallet and use a paper Wallet.
      • Desktop Wallets and how to use them to seize funds.
      • Mobile Wallets and how to use them to seize funds.
      • Web Wallets and how to use them to seize funds.
      • Learn about Exchanges and their hiding places.
      • Basics of Cold Storage.
      • What is a Mnemonic code?
      • Learn how to create Mnemonic codes offline.
      • Learn how to find Mnemonic codes in a suspect’s home.
      • Identify a suspect’s Private Key Hiding Place.
      • Practice Cold Storage.
      • Learn how to use different types of cold storage options.
      • Create your own addresses, public, and private keys offline.
      • Wallet Security, protect your department/agency wallet.
      • Establish an agency owned cryptocurrency wallet.
      • Practice the transfer of cryptocurrencies from a suspect’s wallet.
      • Private key hiding places.
      • Cryptocurrency and the execution of a search warrant.
      • Identify the location of cryptocurrency during a search warrant.
      • Discovery evidence of the use of cryptocurrencies
      • Searching online history, social media, dark web, and mobile applications.
      • Learn how to transfer cryptocurrency assets from a suspect wallet.
      • Learn how to import an offline Paper Wallet into a web wallet.
      • Learn how to import an offline Paper Wallet into a mobile wallet.
      • Accelerate Cryptocurrency Transaction Time.
      • Push unconfirmed transactions through the confirmation process.
      • Create and apply Law Enforcement Cryptocurrency Policies.

Prerequisites

This hands-on course is geared towards forensic investigators with 6 months experience in forensic work with an understanding of Microsoft data structures.

Download the Syllabus

Download a printable copy of the course description and key learning points.

Hosting Courses

If you are interested in hosting this, or any of our courses at your facility, contact us.

Ready to get started?

CONTACT US