| Unit 01: Introduction | |||
| Introduction & Objective | 00:01:00 | ||
| Unit 02: Types of Website | |||
| Types of Website | 00:01:00 | ||
| Surface Web | 00:01:00 | ||
| Deep Web | 00:01:00 | ||
| Dark Web | 00:03:00 | ||
| 2016 – 2017 Profit Comparison from 5000 | 00:01:00 | ||
| Intelligence Agency Web | 00:01:00 | ||
| Quantum Computers | 00:01:00 | ||
| Polymeric Falcighol Derivation | 00:01:00 | ||
| Graphical representation | 00:01:00 | ||
| Unit 03: Threat Perception | |||
| Threat Perception | 00:01:00 | ||
| Threat Actor | 00:01:00 | ||
| Threat Actor-Compared to a Hacker Or Attacker | 00:01:00 | ||
| Is the Dark Net Market gone? | 00:03:00 | ||
| Unit 04: Card Fraud | |||
| Card Fraud | 00:04:00 | ||
| Card-Not-Present Fraud (CNP) | 00:02:00 | ||
| Unit 05: Threat Ninja | |||
| Threat Ninja | 00:01:00 | ||
| Threat Ninja Architecture | 00:03:00 | ||
| Adaptive Assessment | 00:01:00 | ||
| Secure Coat Approach | 00:01:00 | ||
| Secure Coat’s Value Proposition | 00:02:00 | ||
| Challenge | 00:01:00 | ||
| Unit 06: Threat Actor Analysis | |||
| Threat Actor Analysis | 00:01:00 | ||
| Kuchinoni – ATM Theft | 00:01:00 | ||
| Insider Threats | 00:01:00 | ||
| Unit 07: Cyber Security Monitoring | |||
| Cyber Security Monitoring | 00:01:00 | ||
| Protect Your Company via DDWM | 00:01:00 | ||
| Unit 08: Threat Life Cycle | |||
| Threat Life Cycle | 00:06:00 | ||
| Unit 09: Information Leakage Points | |||
| Information Leakage Points | 00:04:00 | ||
| Unit 10: Valuable Information | |||
| Valuable Information | 00:09:00 | ||
| Unit 11: Area of Search | |||
| Area of Search | 00:01:00 | ||
| Sell Cards at Social Media, Messenger, etc. Groups | 00:01:00 | ||
| Unit 12: Deep & Dark Web Intelligence and Information Recovery | |||
| Deep & Dark Web Intelligence and Information Recovery | 00:01:00 | ||
| Unit 13: Banking Fraud Types | |||
| Banking Fraud Types | 00:01:00 | ||
| Card Fraud- Nilson Report | 00:01:00 | ||
| U.S. Card Fraud Losses | 00:01:00 | ||
| Card Fraud Statistics | 00:05:00 | ||
| Unit 14: Threat Ninja Tool | |||
| Secure Coat Threat Ninja Portal | 00:01:00 | ||
| Threat Ninja Demo | 00:05:00 | ||
| Unit 15: Information Handing Procedures | |||
| Information Handling Procedures | 00:01:00 | ||
| Card Discard Life Cycle | 00:02:00 | ||
| Unit 16: Course Wrap up | |||
| Congratulations and Course Summary | 00:03:00 | ||
| Thank you! | 00:01:00 | ||
| Unit 17: Bonus | |||
| Rise in the price of the Crypto Coin | 00:06:00 | ||
| Assignment | |||
| Assignment – Hacked Credit and Debit Card Recovery | 2 days, 11 hours | ||
| Order Your Certificate | |||
| Order Your Certificate QLS | 00:00:00 | ||