Course Catalog

Specialized programs designed for investigators, analysts, and prosecutors, providing practical, up-to-date training in digital asset investigations. All courses delivered through the Canvas Online Learning platform. Available all at once, or through cohort or asynchronous weekly delivery.

Browse all available courses and filter by level.

Best Practices for Crypto Investigative Response

Active

Best Practices for Crypto Investigative Response

Learn essential best practices for responding to cryptocurrency investigations.

  • Intermediate
Intro to Digital Asset Investigations part 1 – Intelligence

Active

Intro to Digital Asset Investigations part 1 – Intelligence

Master intelligence gathering techniques for digital asset investigations.

  • Intermediate
John Doe Wants To Learn Crypto part 1 – Bitcoin

Active

John Doe Wants To Learn Crypto part 1 – Bitcoin

Introduction to Bitcoin fundamentals and how cryptocurrency works.

  • Beginner
Intro to Digital Asset Investigations part 2 – Investigative Methods

Active

Intro to Digital Asset Investigations part 2 – Investigative Methods

Apply investigative methods to trace and analyze digital asset transactions.

  • Intermediate
Crypto Guide: Seizing to Managing Digital Assets

Active

Crypto Guide: Seizing to Managing Digital Assets

Comprehensive guide to seizing, securing, and managing cryptocurrency assets.

  • Intermediate
Certified Digital Asset Intelligence Specialist

Active

Certified Digital Asset Intelligence Specialist

Seven-module professional certification in cryptocurrency intelligence attribution.

  • Advanced
John Doe Wants To Learn Crypto part 2 – Ethereum

Active

John Doe Wants To Learn Crypto part 2 – Ethereum

Understanding Ethereum, smart contracts, and decentralized applications.

  • Beginner
Law Enforcement Guide to Crypto Seizures

Active

Law Enforcement Guide to Crypto Seizures

Master the process of investigating, tracing, and seizing cryptocurrency.

  • Advanced

Active

John Doe Wants To Learn Crypto part 3 – Stablecoins

Learn about stablecoins, their mechanisms, and role in the crypto ecosystem.

  • Beginner
The Application of Cryptocurrency in Terrorist Financing

In Development

The Application of Cryptocurrency in Terrorist Financing

Analyze cryptocurrency use in terrorism and national security threats.

  • Advanced
The Role of Cryptocurrency on the Dark Web

In Development

The Role of Cryptocurrency on the Dark Web

Investigate Dark Web markets and apply crypto tracing to criminal cases.

  • Advanced
OSINT for Crypto Investigations

In Development

OSINT for Crypto Investigations

Apply OSINT methods and intelligence cycle to cryptocurrency attribution.

  • Advanced

Active

John Doe Wants To Learn Crypto part 3 – Stablecoins

Learn about stablecoins, their mechanisms, and role in the crypto ecosystem.

  • Beginner
John Doe Wants To Learn Crypto part 2 – Ethereum

Active

John Doe Wants To Learn Crypto part 2 – Ethereum

Understanding Ethereum, smart contracts, and decentralized applications.

  • Beginner
John Doe Wants To Learn Crypto part 1 – Bitcoin

Active

John Doe Wants To Learn Crypto part 1 – Bitcoin

Introduction to Bitcoin fundamentals and how cryptocurrency works.

  • Beginner
Crypto Guide: Seizing to Managing Digital Assets

Active

Crypto Guide: Seizing to Managing Digital Assets

Comprehensive guide to seizing, securing, and managing cryptocurrency assets.

  • Intermediate
Intro to Digital Asset Investigations part 2 – Investigative Methods

Active

Intro to Digital Asset Investigations part 2 – Investigative Methods

Apply investigative methods to trace and analyze digital asset transactions.

  • Intermediate
Intro to Digital Asset Investigations part 1 – Intelligence

Active

Intro to Digital Asset Investigations part 1 – Intelligence

Master intelligence gathering techniques for digital asset investigations.

  • Intermediate
Best Practices for Crypto Investigative Response

Active

Best Practices for Crypto Investigative Response

Learn essential best practices for responding to cryptocurrency investigations.

  • Intermediate
OSINT for Crypto Investigations

In Development

OSINT for Crypto Investigations

Apply OSINT methods and intelligence cycle to cryptocurrency attribution.

  • Advanced
The Role of Cryptocurrency on the Dark Web

In Development

The Role of Cryptocurrency on the Dark Web

Investigate Dark Web markets and apply crypto tracing to criminal cases.

  • Advanced
The Application of Cryptocurrency in Terrorist Financing

In Development

The Application of Cryptocurrency in Terrorist Financing

Analyze cryptocurrency use in terrorism and national security threats.

  • Advanced
Law Enforcement Guide to Crypto Seizures

Active

Law Enforcement Guide to Crypto Seizures

Master the process of investigating, tracing, and seizing cryptocurrency.

  • Advanced
Certified Digital Asset Intelligence Specialist

Active

Certified Digital Asset Intelligence Specialist

Seven-module professional certification in cryptocurrency intelligence attribution.

  • Advanced

Professional Courses

Choose a course below to learn more about the curriculum

Certified Digital Asset Intelligence Specialist

Active

Certified Digital Asset Intelligence Specialist

Students will focus on the methods of analysis for cryptocurrency intelligence attribution. The course is presented in seven weekly modules detailing all aspects of cryptocurrency attribution and intelligence. Discussion and assignments cover methods of Human Intelligence (HUMINT), Cyber Intelligence (CyBINT), and Open Source Intelligence (OSINT). This course certifies that students are capable of performing cryptocurrency intelligence collection and analysis. Students are awarded a certificate of completion and recognition as a Certified Digital Asset Intelligence Specialist.

  • Duration

    Self-paced, asynchronous

  • Target Audience

    Investigators, analysts, and intelligence specialists

  • Level

    Professional Certification

Course Delivery

Self-paced, asynchronous delivery through Canvas Online Learning platform

Prerequisites

Basic understanding of law enforcement procedures

Certification

Certificate of completion and recognition as a Certified Digital Asset Intelligence Specialist

Learning Objectives

  • Students will focus on the methods of analysis for cryptocurrency intelligence attribution through Human Intelligence (HUMINT), Cyber Intelligence (CyBINT), and Open Source Intelligence (OSINT).
  • This course certifies that students are capable of performing cryptocurrency intelligence collection and analysis.

  • Students are awarded a certificate of completion and recognition as a Certified Digital Asset Intelligence Specialist.

Course Modules

Students are introduced to the History and Development of Digital Assets. Understanding the history of digital assets enables students to observe the evolution of technology and its applications in various scenarios. As an investigator and intelligence analyst, understanding how technology has been applied to criminal offenses and adapted as a criminal instrument allows investigators and intelligence analysts to be more engaged in the investigation and develop new leads and intelligence in cases involving digital assets.

Module Two introduces students to how technology works, while also applying methods of understanding technology and how to obtain evidence and intelligence from it. Module two is important to investigators who are preparing for expert witness testimony and being able to offer knowledgeable explanations for basic applications of technology surrounding digital assets.

As an investigator or intelligence specialists, knowledge related to the specific crimes governing cases of fraud, theft, money laundering or as proceeds or other criminal offenses, is crucial for investigators involved with digital assets and cryptocurrency. This module discusses these laws and their application to digital assets and cryptocurrency investigations and intelligence operations.

Since all digital assets and cryptocurrencies are created on a blockchain that is designed to be anonymous, investigators may be able to attribute a specific wallet or transaction to an individual or entity. There are specific applications of intelligence (HUMINT, CyBINT, OSINT) that can be applied to attribution to further investigations.

The process of investigating digital assets is unique based on the data provided in the public blockchains. Module Five applies proven investigative methods to cases involving digital assets. Additionally, this module presents analysis of search warrant and subpoena process, as well as AML / KYC Processes in the financial industry.

Cryptocurrency tracing is a unique feature and intelligence methods specific to the blockchains. There are both open source capabilities and private sector commercial tools that enhance these intelligence functions. In module six, students will be introduced to these tools and how to put them to use.

This final module is based on case studies and specific tracing applications. Students will be presented various case scenarios through search warrant and case report applications. They will work through the specific case data and produce results of their investigations.

Law Enforcement Guide to Crypto Seizures

Active

Law Enforcement Guide to Crypto Seizures

This course is a guide for understanding the process law enforcement uses to handle cryptocurrency seizures. We will discuss the specific steps investigators take, from investigating crypto fraud to understanding the different methods of managing the seized assets, including eventually returning the seized funds to the victims. The course begins by providing an overview of the origins of Bitcoin and an explanation as to the “why” cryptocurrency was developed. The course will explore; where crypto originated from, who invented it, how it works, hot/cold/paper wallets, the security of the blockchain, and tracing cryptocurrency addresses. We will examine the best practices of investigating cryptocurrency cases, how investigators can successfully trace, freeze and seize these digital assets and what tools they can use to complete the tracing of stolen crypto to include open source blockchain explorers and paid for tracing tools like Chainalysis, TRM and QLUE. The course takes students through local, state and federal seizure warrants, and provides examples and templates of these documents. The course will also show the different tools agencies can use to legally freeze, seize and forfeit stolen cryptocurrency, to include the federal: Administrative, and Civil Judicial criminal forfeitures along with local and state Search & Seizure Warrants. Additionally, the course will go into the managing of cryptocurrency and ways that local, state and federal law enforcement agencies can easily track their held digital assets that they have seized to include what stage of the seizure process these assets are in by utilizing platforms such as “Watchtower.” The course finishes with a question to students as to “where does law enforcement go from here?” This challenges students to not only evaluate the lessons they have learned throughout the previous modules, but to apply this knowledge to help them understand the path as to where law enforcement currently stands with cryptocurrency investigations.

  • Duration

    Self-paced, asynchronous

  • Target Audience

    Law enforcement investigators and prosecutors

  • Level

    Professional

Course Delivery

Self-paced, asynchronous delivery through Canvas Online Learning platform

Prerequisites

Basic understanding of cryptocurrency

Certification

Certificate of completion

Learning Objectives

  • Explain the origins of cryptocurrency, the blockchain, and how a Peer-to-Peer network works.
  • Discuss the uses of cryptocurrency, how public and private keys work, and crypto exchanges.
  • Evaluate Centralized vs. Decentralized regarding crypto, hot/cold/paper wallets, and how the blockchain ledger works.
  • Examine how mixers and tumblers work.
  • Describe the common crypto scams such as Rug Pulls, Honey Pots, and Pump & Dumps.
  • Compare crypto crimes reported by victims vs. agency self-generated cases.
  • Examine the purpose of the “Dark Web” and how bad actors exploit it.
  • Distinguish the differences between tracing cryptocurrency using an “open source blockchain explorer” vs. a “paid digital forensic tool.”
  • Demonstrate how to trace a wallet address using a “Transaction Hash.”
  • Explain the different methods of freezing cryptocurrency and the importance of speed when tracing and freezing stolen digital assets.
  • Evaluate law enforcement’s different tools for freezing, seizing, and forfeiting cryptocurrency from suspects’ wallets and accounts.
  • Describe the process of seizing crypto assets through the local and state processes.
  • Explain the three federal forfeiture options: Administrative, Civil Judicial, and Criminal.
  • Compare the differences between seizing and forfeiting crypto assets through the local/state process and the federal process.
  • Explain the five steps investigators must take to successfully return cryptocurrency to their victims.
  • Evaluate the importance of having WAVE’s WatchTower platform available to local, state, and federal agencies and how this tool can assist these agencies with maintaining a clear and understandable ledger of their seized digital assets.

Course Modules

  • Explain the origins of cryptocurrency, the blockchain, and how a Peer-to-Peer network works.
  • Discuss the uses of cryptocurrency, how public and private keys work, and crypto exchanges.
  • Evaluate Centralized vs. Decentralized regarding crypto, hot/cold/paper wallets, and how the blockchain ledger works.
  • Examine how mixers and tumblers work.
  • Describe the common crypto scams such as Rug Pulls, Honey Pots, and Pump & Dumps.

  • Compare crypto crimes reported by victims vs. agency self-generated cases.
  • Examine the purpose of the “Dark Web” and how bad actors exploit it.

  • Distinguish the differences between tracing cryptocurrency using an “open source blockchain explorer” vs. a “paid digital forensic tool.”
  • Demonstrate how to trace a wallet address using a “Transaction Hash.”

  • Explain the different methods of freezing cryptocurrency and the importance of speed when tracing and freezing stolen digital assets.
  • Evaluate law enforcement’s different tools for freezing, seizing, and forfeiting cryptocurrency from suspects’ wallets and accounts.

  • Describe the process of seizing crypto assets through the local and state processes.
  • Explain the three federal forfeiture options: Administrative, Civil Judicial, and Criminal.
  • Compare the differences between seizing and forfeiting crypto assets through the local/state process and the federal process.

  • Explain the five steps investigators must take to successfully return cryptocurrency to their victims.
  • Evaluate the importance of having WAVE’s WatchTower platform available to local, state, and federal agencies and how this tool can assist these agencies with maintaining a clear and understandable ledger of their seized digital assets.

  • Explain what local, state and federal law enforcement agencies can do to improve training for crypto fraud.
  • Discuss the importance of crypto asset investigators in curtailing significant global criminal operations.
The Role of Cryptocurrency on the Dark Web

In Development

The Role of Cryptocurrency on the Dark Web

Examines the use of cryptocurrency on the dark web through both criminal investigations and intelligence driven / national security perspectives. This course examines how the dark web, anonymous internet tools and cryptocurrency are used as criminal instruments to further criminal activity and money laundering. Students examine the use of Dark Web markets involving narcotics and fraud related material. This also involves examination of surface web mirror marketplaces. Students will apply investigative methods towards the process of “de-anonymization”. Students will analyze previously successful dark web related investigations to expand the investigative methodology and mindset related to these cases.

  • Duration

    Self-paced, asynchronous

  • Target Audience

    Investigators and intelligence analysts

  • Level

    Advanced

Course Delivery

Self-paced, asynchronous delivery through Canvas Online Learning platform

Prerequisites

Experience with cryptocurrency investigations

Certification

Certificate of completion

Learning Objectives

  • Identify how Dark Web markets operate
  • Discuss investigative methods related to the De-Anonymization process of suspects on the Dark Web
  • Identify and Define the role of cryptocurrency as it relates to dark web transactions
  • Analyze cryptocurrency transactions related to dark web markets
  • Identify open source tools for dark web activity
  • Identify open source tools related to cryptocurrency intelligence
  • Employ cryptocurrency tracing methodologies from companies like Lukka and Blockchain Intelligence Group

Course Modules

In module one students are introduced to Dark Web marketplaces on the Tor browser and how to identity current marketplaces. Students discuss the features of the markets and current trends market place operators are using to ensure anonymity and carry out transactions.

Module two focuses on discussion and brainstorming activities to plan and organize investigative methods in response to Dark Web markets. Specific focus is given to creation of a defined process of “de-anonymization.”

This module introduces students to the role of cryptocurrency on the Dark Web and how suspects plan criminal operations using cryptocurrency. This section involves not only using crypto to profit from using cryptocurrency but also how cryptocurrency can be used to launder the proceeds of dark web transactions.

In this module students are introduced to the data involved in cryptocurrency transactions and how that data can be analyzed. Additional focus is given to how the transactions can be connected to Dark Web use and activity.

Students are introduced to various open source tools and how to gather intelligence and information related to Dark Web Markets and surface web mirrors. The collection of this data can be used as evidence to build criminal cases seeking prosecution or furthering intelligence towards national security measures.

Module six involves a similar approach to module five and works to make the connections from the dark web markets to the cryptocurrency transactions. These investigative methods effectively move the investigation further and continue to develop intelligence. Additional focus is given to effectively articulating the investigative process to present strong cases for court and effective witness testimony.

Students are introduced to commercial cryptocurrency tracing tools like Lukka Investigator and Blockchain Intelligence Group QLUE for crypto tracing investigations. With these tools, students apply all previously learned investigative and intelligence driven methods using the tracing tools.

OSINT for Crypto Investigations

In Development

OSINT for Crypto Investigations

Students are introduced to the intelligence cycle and begin to apply intelligence methods to cryptocurrency attribution. Since all cryptocurrencies make use of public blockchains, students are introduced to the use of open sources as intelligence sources. Students learn to apply intelligence processes involved with collection, analysis, exploitation, and dissemination. This course makes use of recent case studies from criminal proceedings involving cryptocurrency.

  • Duration

    Self-paced, asynchronous

  • Target Audience

    Intelligence analysts and investigators

  • Level

    Intermediate

Course Delivery

Self-paced, asynchronous delivery through Canvas Online Learning platform

Prerequisites

Basic cryptocurrency and intelligence concepts

Certification

Certificate of completion

Learning Objectives

  • Students will examine the intelligence cycle and the application of Open Source Intelligence (OSINT) to cryptocurrency investigations.
  • Students will discuss intelligence collection methods through open sources.
  • Students will identify intelligence analysis methods for cryptocurrency attribution.
  • Students will apply attribution methods to intelligence collected from open sources.
  • Students will discuss public blockchains related to digital assets and how they offer open source intelligence for investigations.
  • Students will examine various open source tracing and investigative tools used to further digital asset investigations and intelligence.
  • Students will apply methods of HUMINT and CyBINT to OSINT investigations involving digital assets and cryptocurrencies.

Course Modules

Students will examine the intelligence cycle and the application of Open Source Intelligence (OSINT) to cryptocurrency investigations. The phases of the intelligence cycle are important to all aspects of intelligence. This helps investigators and analysts identify how and why information is collected, processed, analyzed and disseminated. The intelligence cycle is used to create a process or system which works towards validating information as credible which allows for action to be taken based on that intelligence.

Students will discuss intelligence collection methods through open sources for crypto attribution. Attribution is a critical part of digital asset investigations. Attribution tells investigators where to go for the next stop in the investigations where evidence can be found. Without Attribution, there are only random letters and numbers associated with digital asset wallets. There is a specific process related to the application of intelligence methods in order to obtain attribution.

Students will identify intelligence analysis methods for cryptocurrency attribution. The key to attribution is the intelligence and intelligence is most effective and reliable when there is a specific process in the analysis of the intelligence. Students will learn to apply investigative methods that articulate their findings in a repeatable process which leads to the ability to validate findings and further criminal investigations and intelligence.

There is a unique approach to intelligence involved in digital asset and cryptocurrency investigations. Students will apply attribution methods to intelligence collected from open sources and develop their own Attributions Intelligence Rating System.

When it comes to digital asset and cryptocurrencies, they are all made possible through a public blockchain that offers no expectation of privacy. The blockchain is open to everyone, including law enforcement. It is the perfect example of open source intelligence. In module five, Students will discuss and identify public blockchains related to digital assets and how they offer open source intelligence for investigations.

Students will examine various open source tracing and investigative tools used to further digital asset investigations and intelligence. This module will also help students prepare for vendor certification in the different tracing tools.

Students will apply methods of HUMINT and CyBINT to OSINT investigations involving with digital assets and cryptocurrencies. This module looks to bring together all learned investigative and intelligence methods. A scenario based mock investigation and intelligence operation is designed for students to demonstrate their knowledge of investigative methods as applied to digital asset investigations.

The Application of Cryptocurrency in Terrorist Financing

In Development

The Application of Cryptocurrency in Terrorist Financing

The course provides an overview of the origins of Bitcoin and an explanation as to the “why” cryptocurrency was developed. The course will explore; where crypto came from, who invented it, how it works, hot/cold/paper wallets, the security of the blockchain, and tracing cryptocurrency addresses. We will examine how cryptocurrency has impacted National Security and what international government agencies are doing to protect their citizens. Additionally, the course will go into the blockchain and discuss how criminals attempt to hide behind the blockchain and the use of the Dark Web to conceal their identities while committing heinous and criminal acts. The course takes a specific look into how terrorists are using cryptocurrency to fund worldwide operations, while attempting to avoid detection. The current crypto regulatory oversight will be discussed as well as best practices for law enforcement agencies for investigating crypto fraud. The course finishes with a question to students as to “where does law enforcement go from here?” This challenges students to not only evaluate the lessons they have learned throughout the previous modules, but to apply this knowledge to help them understand the path as to where law enforcement currently stands with cryptocurrency investigations.

  • Duration

    Self-paced, asynchronous

  • Target Audience

    National security analysts and law enforcement

  • Level

    Advanced

Course Delivery

Self-paced, asynchronous delivery through Canvas Online Learning platform

Prerequisites

Understanding of cryptocurrency basics and national security concepts

Certification

Certificate of completion

Learning Objectives

  • Explain the origins of Cryptocurrency, the Blockchain and how a Peer-to-Peer network works.
  • Discuss the uses of Cryptocurrency, how public & private keys work and crypto exchanges.

  • Examine how the worldwide use of cryptocurrency has an effect to National Security.

  • Illustrate how the blockchain works, what makes it safe and what layers of anonymity it provides to its users.

  • Discuss what regulatory oversight that has been put in place and if the current regulations are enough to deter terrorists.

  • Describe the best practices for law enforcement when it comes to investigating, freezing, seizing and forfeiting cryptocurrency at the local, state and federal levels.

  • Summarize where law enforcement can go from here in order to obtain the valuable tools and education needed to properly investigate terrorist organizations who are using the blockchain for their operational use.

Course Modules

  • Explain the origins of cryptocurrency, the blockchain, and how a Peer-to-Peer network works.
  • Discuss the uses of cryptocurrency, how public and private keys work, and crypto exchanges.

  • Evaluate Centralized vs. Decentralized regarding crypto, hot/cold/paper wallets, and how the blockchain ledger works.

  • Examine how mixers and tumblers work.

  • Describe the common crypto scams such as Rug Pulls, Honey Pots, and Pump & Dumps.

  • Discuss the uses cryptocurrency can have for international criminal organizations.
  • Explain how criminal organizations using cryptocurrency can affect national security.
  • Examine methods used by governments to restrict criminals from exploiting anonymity with their use of crypto.

  • Explain the blockchain’s ability to create a layer of anonymity for users.
  • Illustrate how the blockchain works and the method it uses to keep a ledger of all transactions.
  • Illustrate how cold, hot and paper wallets work.
  • Examine the Dark Web and how cryptocurrency is used to further criminal activity.

  • Discuss the “Dark Web”, “Darknet”, and TOR “The Onion Router” and how terrorists take advantage of using the Dark Web.
  • Explain how cryptocurrency is illegally used on the Dark Web and how 18USC1960 can help prevent these crimes.
  • Examine how Tumblers/Mixers, funnel accounts, and the lack of regulations can further illegal crimes such as child exploitation, drug & human smuggling and terrorism, via the Dark Web and cryptocurrency.
  • Discuss the benefits vs the risk with the lack of government and LE involvement in the crypto world and what effect that can have on terrorist organizations.

  • Summarize the current crypto regulator oversight.
  • Explain how more crypto oversight may or may not be beneficial to combat terrorism.

  • Discuss the best practices for law enforcement with investigating cryptocurrency crime.
  • Explain the different methods of freezing, seizing and forfeiting cryptocurrency within the local, state and federal agencies.
  • Describe what tools forensic analyst and law enforcement officers can use to investigate crypto crime via the Blockchain.

  • Explain what local, state and federal law enforcement agencies can do to improve training for crypto fraud.
  • Discuss the importance of crypto asset investigators in curtailing significant global criminal operations.