| Unit 01: Introduction |
|
Introduction & Objective |
|
00:01:00 |
| Unit 02: Types of Website |
|
Types of Website |
|
00:01:00 |
|
Surface Web |
|
00:01:00 |
|
Deep Web |
|
00:01:00 |
|
Dark Web |
|
00:03:00 |
|
2016 – 2017 Profit Comparison from 5000 |
|
00:01:00 |
|
Intelligence Agency Web |
|
00:01:00 |
|
Quantum Computers |
|
00:01:00 |
|
Polymeric Falcighol Derivation |
|
00:01:00 |
|
Graphical representation |
|
00:01:00 |
| Unit 03: Threat Perception |
|
Threat Perception |
|
00:01:00 |
|
Threat Actor |
|
00:01:00 |
|
Threat Actor-Compared to a Hacker Or Attacker |
|
00:01:00 |
|
Is the Dark Net Market gone? |
|
00:03:00 |
| Unit 04: Card Fraud |
|
Card Fraud |
|
00:04:00 |
|
Card-Not-Present Fraud (CNP) |
|
00:02:00 |
| Unit 05: Threat Ninja |
|
Threat Ninja |
|
00:01:00 |
|
Threat Ninja Architecture |
|
00:03:00 |
|
Adaptive Assessment |
|
00:01:00 |
|
Secure Coat Approach |
|
00:01:00 |
|
Secure Coat’s Value Proposition |
|
00:02:00 |
|
Challenge |
|
00:01:00 |
| Unit 06: Threat Actor Analysis |
|
Threat Actor Analysis |
|
00:01:00 |
|
Kuchinoni – ATM Theft |
|
00:01:00 |
|
Insider Threats |
|
00:01:00 |
| Unit 07: Cyber Security Monitoring |
|
Cyber Security Monitoring |
|
00:01:00 |
|
Protect Your Company via DDWM |
|
00:01:00 |
| Unit 08: Threat Life Cycle |
|
Threat Life Cycle |
|
00:06:00 |
| Unit 09: Information Leakage Points |
|
Information Leakage Points |
|
00:04:00 |
| Unit 10: Valuable Information |
|
Valuable Information |
|
00:09:00 |
| Unit 11: Area of Search |
|
Area of Search |
|
00:01:00 |
|
Sell Cards at Social Media, Messenger, etc. Groups |
|
00:01:00 |
| Unit 12: Deep & Dark Web Intelligence and Information Recovery |
|
Deep & Dark Web Intelligence and Information Recovery |
|
00:01:00 |
| Unit 13: Banking Fraud Types |
|
Banking Fraud Types |
|
00:01:00 |
|
Card Fraud- Nilson Report |
|
00:01:00 |
|
U.S. Card Fraud Losses |
|
00:01:00 |
|
Card Fraud Statistics |
|
00:05:00 |
| Unit 14: Threat Ninja Tool |
|
Secure Coat Threat Ninja Portal |
|
00:01:00 |
|
Threat Ninja Demo |
|
00:05:00 |
| Unit 15: Information Handing Procedures |
|
Information Handling Procedures |
|
00:01:00 |
|
Card Discard Life Cycle |
|
00:02:00 |
| Unit 16: Course Wrap up |
|
Congratulations and Course Summary |
|
00:03:00 |
|
Thank you! |
|
00:01:00 |
| Unit 17: Bonus |
|
Rise in the price of the Crypto Coin |
|
00:06:00 |
| Assignment |
|
Assignment – Hacked Credit and Debit Card Recovery Course |
|
00:00:00 |
| Order Your Certificate |
|
Order Your Certificate |
|
00:00:00 |