Specialized programs designed for investigators, analysts, and prosecutors, providing practical, up-to-date training in digital asset investigations. All courses delivered through the Canvas Online Learning platform. Available all at once, or through cohort or asynchronous weekly delivery.
Browse all available courses and filter by level.
Active
Learn essential best practices for responding to cryptocurrency investigations.
Active
Master intelligence gathering techniques for digital asset investigations.
Active
Introduction to Bitcoin fundamentals and how cryptocurrency works.
Active
Apply investigative methods to trace and analyze digital asset transactions.
Active
Comprehensive guide to seizing, securing, and managing cryptocurrency assets.
Active
Seven-module professional certification in cryptocurrency intelligence attribution.
Active
Understanding Ethereum, smart contracts, and decentralized applications.
Active
Master the process of investigating, tracing, and seizing cryptocurrency.
Active
Learn about stablecoins, their mechanisms, and role in the crypto ecosystem.
In Development
Analyze cryptocurrency use in terrorism and national security threats.
In Development
Investigate Dark Web markets and apply crypto tracing to criminal cases.
In Development
Apply OSINT methods and intelligence cycle to cryptocurrency attribution.
Active
Learn about stablecoins, their mechanisms, and role in the crypto ecosystem.
Active
Understanding Ethereum, smart contracts, and decentralized applications.
Active
Introduction to Bitcoin fundamentals and how cryptocurrency works.
Active
Comprehensive guide to seizing, securing, and managing cryptocurrency assets.
Active
Apply investigative methods to trace and analyze digital asset transactions.
Active
Master intelligence gathering techniques for digital asset investigations.
Active
Learn essential best practices for responding to cryptocurrency investigations.
In Development
Apply OSINT methods and intelligence cycle to cryptocurrency attribution.
In Development
Investigate Dark Web markets and apply crypto tracing to criminal cases.
In Development
Analyze cryptocurrency use in terrorism and national security threats.
Active
Master the process of investigating, tracing, and seizing cryptocurrency.
Active
Seven-module professional certification in cryptocurrency intelligence attribution.
Choose a course below to learn more about the curriculum
Active
Students will focus on the methods of analysis for cryptocurrency intelligence attribution. The course is presented in seven weekly modules detailing all aspects of cryptocurrency attribution and intelligence. Discussion and assignments cover methods of Human Intelligence (HUMINT), Cyber Intelligence (CyBINT), and Open Source Intelligence (OSINT). This course certifies that students are capable of performing cryptocurrency intelligence collection and analysis. Students are awarded a certificate of completion and recognition as a Certified Digital Asset Intelligence Specialist.
Self-paced, asynchronous delivery through Canvas Online Learning platform
Basic understanding of law enforcement procedures
Certificate of completion and recognition as a Certified Digital Asset Intelligence Specialist
This course certifies that students are capable of performing cryptocurrency intelligence collection and analysis.
Students are awarded a certificate of completion and recognition as a Certified Digital Asset Intelligence Specialist.
Students are introduced to the History and Development of Digital Assets. Understanding the history of digital assets enables students to observe the evolution of technology and its applications in various scenarios. As an investigator and intelligence analyst, understanding how technology has been applied to criminal offenses and adapted as a criminal instrument allows investigators and intelligence analysts to be more engaged in the investigation and develop new leads and intelligence in cases involving digital assets.
Module Two introduces students to how technology works, while also applying methods of understanding technology and how to obtain evidence and intelligence from it. Module two is important to investigators who are preparing for expert witness testimony and being able to offer knowledgeable explanations for basic applications of technology surrounding digital assets.
As an investigator or intelligence specialists, knowledge related to the specific crimes governing cases of fraud, theft, money laundering or as proceeds or other criminal offenses, is crucial for investigators involved with digital assets and cryptocurrency. This module discusses these laws and their application to digital assets and cryptocurrency investigations and intelligence operations.
Since all digital assets and cryptocurrencies are created on a blockchain that is designed to be anonymous, investigators may be able to attribute a specific wallet or transaction to an individual or entity. There are specific applications of intelligence (HUMINT, CyBINT, OSINT) that can be applied to attribution to further investigations.
The process of investigating digital assets is unique based on the data provided in the public blockchains. Module Five applies proven investigative methods to cases involving digital assets. Additionally, this module presents analysis of search warrant and subpoena process, as well as AML / KYC Processes in the financial industry.
Cryptocurrency tracing is a unique feature and intelligence methods specific to the blockchains. There are both open source capabilities and private sector commercial tools that enhance these intelligence functions. In module six, students will be introduced to these tools and how to put them to use.
This final module is based on case studies and specific tracing applications. Students will be presented various case scenarios through search warrant and case report applications. They will work through the specific case data and produce results of their investigations.
Active
This course is a guide for understanding the process law enforcement uses to handle cryptocurrency seizures. We will discuss the specific steps investigators take, from investigating crypto fraud to understanding the different methods of managing the seized assets, including eventually returning the seized funds to the victims. The course begins by providing an overview of the origins of Bitcoin and an explanation as to the “why” cryptocurrency was developed. The course will explore; where crypto originated from, who invented it, how it works, hot/cold/paper wallets, the security of the blockchain, and tracing cryptocurrency addresses. We will examine the best practices of investigating cryptocurrency cases, how investigators can successfully trace, freeze and seize these digital assets and what tools they can use to complete the tracing of stolen crypto to include open source blockchain explorers and paid for tracing tools like Chainalysis, TRM and QLUE. The course takes students through local, state and federal seizure warrants, and provides examples and templates of these documents. The course will also show the different tools agencies can use to legally freeze, seize and forfeit stolen cryptocurrency, to include the federal: Administrative, and Civil Judicial criminal forfeitures along with local and state Search & Seizure Warrants. Additionally, the course will go into the managing of cryptocurrency and ways that local, state and federal law enforcement agencies can easily track their held digital assets that they have seized to include what stage of the seizure process these assets are in by utilizing platforms such as “Watchtower.” The course finishes with a question to students as to “where does law enforcement go from here?” This challenges students to not only evaluate the lessons they have learned throughout the previous modules, but to apply this knowledge to help them understand the path as to where law enforcement currently stands with cryptocurrency investigations.
Self-paced, asynchronous delivery through Canvas Online Learning platform
Basic understanding of cryptocurrency
Certificate of completion
In Development
Examines the use of cryptocurrency on the dark web through both criminal investigations and intelligence driven / national security perspectives. This course examines how the dark web, anonymous internet tools and cryptocurrency are used as criminal instruments to further criminal activity and money laundering. Students examine the use of Dark Web markets involving narcotics and fraud related material. This also involves examination of surface web mirror marketplaces. Students will apply investigative methods towards the process of “de-anonymization”. Students will analyze previously successful dark web related investigations to expand the investigative methodology and mindset related to these cases.
Self-paced, asynchronous delivery through Canvas Online Learning platform
Experience with cryptocurrency investigations
Certificate of completion
In module one students are introduced to Dark Web marketplaces on the Tor browser and how to identity current marketplaces. Students discuss the features of the markets and current trends market place operators are using to ensure anonymity and carry out transactions.
Module two focuses on discussion and brainstorming activities to plan and organize investigative methods in response to Dark Web markets. Specific focus is given to creation of a defined process of “de-anonymization.”
This module introduces students to the role of cryptocurrency on the Dark Web and how suspects plan criminal operations using cryptocurrency. This section involves not only using crypto to profit from using cryptocurrency but also how cryptocurrency can be used to launder the proceeds of dark web transactions.
In this module students are introduced to the data involved in cryptocurrency transactions and how that data can be analyzed. Additional focus is given to how the transactions can be connected to Dark Web use and activity.
Students are introduced to various open source tools and how to gather intelligence and information related to Dark Web Markets and surface web mirrors. The collection of this data can be used as evidence to build criminal cases seeking prosecution or furthering intelligence towards national security measures.
Module six involves a similar approach to module five and works to make the connections from the dark web markets to the cryptocurrency transactions. These investigative methods effectively move the investigation further and continue to develop intelligence. Additional focus is given to effectively articulating the investigative process to present strong cases for court and effective witness testimony.
Students are introduced to commercial cryptocurrency tracing tools like Lukka Investigator and Blockchain Intelligence Group QLUE for crypto tracing investigations. With these tools, students apply all previously learned investigative and intelligence driven methods using the tracing tools.
In Development
Students are introduced to the intelligence cycle and begin to apply intelligence methods to cryptocurrency attribution. Since all cryptocurrencies make use of public blockchains, students are introduced to the use of open sources as intelligence sources. Students learn to apply intelligence processes involved with collection, analysis, exploitation, and dissemination. This course makes use of recent case studies from criminal proceedings involving cryptocurrency.
Self-paced, asynchronous delivery through Canvas Online Learning platform
Basic cryptocurrency and intelligence concepts
Certificate of completion
Students will examine the intelligence cycle and the application of Open Source Intelligence (OSINT) to cryptocurrency investigations. The phases of the intelligence cycle are important to all aspects of intelligence. This helps investigators and analysts identify how and why information is collected, processed, analyzed and disseminated. The intelligence cycle is used to create a process or system which works towards validating information as credible which allows for action to be taken based on that intelligence.
Students will discuss intelligence collection methods through open sources for crypto attribution. Attribution is a critical part of digital asset investigations. Attribution tells investigators where to go for the next stop in the investigations where evidence can be found. Without Attribution, there are only random letters and numbers associated with digital asset wallets. There is a specific process related to the application of intelligence methods in order to obtain attribution.
Students will identify intelligence analysis methods for cryptocurrency attribution. The key to attribution is the intelligence and intelligence is most effective and reliable when there is a specific process in the analysis of the intelligence. Students will learn to apply investigative methods that articulate their findings in a repeatable process which leads to the ability to validate findings and further criminal investigations and intelligence.
There is a unique approach to intelligence involved in digital asset and cryptocurrency investigations. Students will apply attribution methods to intelligence collected from open sources and develop their own Attributions Intelligence Rating System.
When it comes to digital asset and cryptocurrencies, they are all made possible through a public blockchain that offers no expectation of privacy. The blockchain is open to everyone, including law enforcement. It is the perfect example of open source intelligence. In module five, Students will discuss and identify public blockchains related to digital assets and how they offer open source intelligence for investigations.
Students will examine various open source tracing and investigative tools used to further digital asset investigations and intelligence. This module will also help students prepare for vendor certification in the different tracing tools.
Students will apply methods of HUMINT and CyBINT to OSINT investigations involving with digital assets and cryptocurrencies. This module looks to bring together all learned investigative and intelligence methods. A scenario based mock investigation and intelligence operation is designed for students to demonstrate their knowledge of investigative methods as applied to digital asset investigations.
In Development
The course provides an overview of the origins of Bitcoin and an explanation as to the “why” cryptocurrency was developed. The course will explore; where crypto came from, who invented it, how it works, hot/cold/paper wallets, the security of the blockchain, and tracing cryptocurrency addresses. We will examine how cryptocurrency has impacted National Security and what international government agencies are doing to protect their citizens. Additionally, the course will go into the blockchain and discuss how criminals attempt to hide behind the blockchain and the use of the Dark Web to conceal their identities while committing heinous and criminal acts. The course takes a specific look into how terrorists are using cryptocurrency to fund worldwide operations, while attempting to avoid detection. The current crypto regulatory oversight will be discussed as well as best practices for law enforcement agencies for investigating crypto fraud. The course finishes with a question to students as to “where does law enforcement go from here?” This challenges students to not only evaluate the lessons they have learned throughout the previous modules, but to apply this knowledge to help them understand the path as to where law enforcement currently stands with cryptocurrency investigations.
Self-paced, asynchronous delivery through Canvas Online Learning platform
Understanding of cryptocurrency basics and national security concepts
Certificate of completion
Discuss the uses of Cryptocurrency, how public & private keys work and crypto exchanges.
Examine how the worldwide use of cryptocurrency has an effect to National Security.
Illustrate how the blockchain works, what makes it safe and what layers of anonymity it provides to its users.
Discuss what regulatory oversight that has been put in place and if the current regulations are enough to deter terrorists.
Describe the best practices for law enforcement when it comes to investigating, freezing, seizing and forfeiting cryptocurrency at the local, state and federal levels.
Summarize where law enforcement can go from here in order to obtain the valuable tools and education needed to properly investigate terrorist organizations who are using the blockchain for their operational use.
Discuss the uses of cryptocurrency, how public and private keys work, and crypto exchanges.
Evaluate Centralized vs. Decentralized regarding crypto, hot/cold/paper wallets, and how the blockchain ledger works.
Examine how mixers and tumblers work.
Describe the common crypto scams such as Rug Pulls, Honey Pots, and Pump & Dumps.