Courses
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cryptocurrency Certified Cyber CounterIntelligence Analyst - AI-Infused
Section I - Intro - Open Sources - Hunchly - OPSEC - Your GPT
Introduction
Open Source Tools (53:24)
Open Source Tools in Cyber CounterIntelligence and Cryptocurrency Investigations.
Hunch.ly (19:19)
Creating Your GPT - OPSEC (52:44)
Section II - Intro and Awareness
Intro to OPSEC in Blockchain Investigations (25:02)
CryptoCurrency Awareness of Fraud (49:42)
Section IIA - Personas - Character Archetypes
Personas (26:25)
Section III - Cialdini - Trolls Plus - MBTI Destructive
Cialdini (19:16)
Dark Triad - Pitch Black Tetrad (20:24)
Myers-Briggs - Desctructive Under Pressure - Crypto (60:49)
Section IV - Cryptocurrency Threat Actors - NK
Intro to CryptoCurrency Threat Actors (53:05)
Threat Actors
Section V - Dirty Tricks - Rules - Disinformationist
Dirty Tricks (37:10)
Rules for Radicals (17:14)
Disinformationist (12:32)
Section VI - Deception Planning and Methods
Deception in Cyber CounterIntel and CryptoCurrency Investigations (57:43)
Section VII - Offensive Countermeasures - Crypto Focused
ADHD - Offensive Countermeasures (52:01)
Section VIII - SATS for Cryptocurrency
Structured Analytic Techniques in Crypto / Blockchain Investigations (48:45)
Section IX - Cryptocurrency in Russia
Cryptocurrency in Russia – Continuous Rapid Adjustments (46:47)
Section X - Chinese TTPs and Methods
Chinese CounterIntel and Deception TTPs - Methods. (57:03)
Section XI - Analytic Writing for Cryptocurrency Investigations
Analytic Writing (54:00)
Downloadable Content
Downloadable Content
Teach online with
Rules for Radicals
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock