4 CERTIFICATIONS, 1 COURSE!

Certified Cyber Crime Consultant, A+, Network+ And CySA+

  • Certified Cyber Crime Consultant

    A Certified Cyber Crime Consultant is an expert in consulting, advising and investigating not just companies that have been hacked but professional athletes, entertainers, politicians, corporate executives, small businesses, parents, attorneys, private investigators or anyone that has a unique problem to solve, and nowhere else to turn.

    This course includes the final exam. If you score 80% or more, you will receive your certificate as a Certified Cyber Crime Consultant.

  • CompTIA A+

    CompTIA A+ certified professionals are proven problem solvers. They support today’s core technologies from security to cloud to data management and more. CompTIA A+ is the industry standard for launching IT careers into today’s digital world. CompTIA A+ ce also carries globally-recognized ISO/ANSI accreditation status.

    This course includes material that will be found on the A+ exam, by CompTIA. Upon completion of this course, NCS University can provide you with the voucher (extra cost) to take your Network+ exam.

  • CompTIA Cybersecurity Analyst (CySA+)

    CompTIA Cybersecurity Analyst (CySA+) is an IT workforce certification that applies behavioral analytics to networks and devices to prevent, detect and combat cybersecurity threats.

    This course includes material that will be found on the CySA+ exam, by CompTIA. Upon completion of this course, NCS University can provide you with the voucher (extra cost) to take your CySA+ exam.

    CompTIA CySA+ meets the ISO 17024 standard and is approved by U.S. Department of Defense to fulfill Directive 8570.01-M requirements. It is compliant with government regulations under the Federal Information Security Management Act (FISMA).

  • CompTIA Network+

    CompTIA Network+ helps develop a career in IT infrastructure covering troubleshooting, configuring, and managing networks.

    This course includes material that will be found on the Network+ exam, by CompTIA. Upon completion of this course, NCS University can provide you with the voucher (extra cost) to take your Network+ exam.

    More choose Security+ for DoD 8570 compliance than any other certification.

  • The Value Of This Course

    This course contains:

    • 7 Instructors
    • 100 + Videos
    • Over 100 Slide

    On completion of this course, your certification is recognized by the following organizations.

    • Department Of Defense IAT Level 1 and 2
    • Apple
    • Dell
    • HP
    • RICOH
    • Canon
    • Northrop Grumman
    • Netflix

A Certified Cyber Crime Consultant is an expert in consulting, advising and investigating not just companies that have been hacked but professional athletes, entertainers, politicians, corporate executives, small businesses, parents, attorneys, private investigators or anyone that has a unique problem to solve, and nowhere else to turn. 


What makes this course different from other cyber security courses is that Certified Cyber Crime Consultant, teaches the business side, and the technical side of security. Most security certifications and degree programs only teach the technical side, leaving the student unaware of all they can do with their new certification or degree. They neglect to teach the student how to start their own cyber security business or how to pitch their services to companies. 


This course will educate and prepare students for a lucrative and prosperous career in the field of cyber security. Its professors have long histories in the cyber security field and have taught students from various backgrounds including cyber security professionals in local, state, and federal law enforcement. The course prepares not only college students but high school students, as well.  

Certified Cyber Crime Consultants Are Experts In:

  • Hacked Network

    As A Certified Cyber Crime Consultant, You Will Learn How To Investigate Computers, Websites And Networks That Have Been Hacked.

  • Cyber Extortion & Blackmail

    Learn How Consumers, Business People, Entertainers, Athletes, Public Figures Are Being Blackmailed Or Extorted.

  • How To Consultant

    How To Consultant With Other IT Managers, Law Enforcement, CEO's, Small Business Owners, Athletes, Entertainers and Other Organizations.

  • Social Media Investigations

    Learn Different Techniques You Can Use To Locate A Person, Find Their Locations, Track Their Activities, Locate Their Friends And Family, Plus A Lot More.

  • Identity Theft

    Learn How Individuals As Well As Companies Have Their Identities Stolen. Then Learn What The Bad Guys Do Once They Have The Identities.

  • Scams

    Learn About The Different Scams And Schemes Crooks Use To Steal Information. This Includes Email Scams, Telephone Scams And More.

  • According to the Verizon Data Breach Investigation Report: 61% of breaches occurred in smaller business last year.
  • According to UPS Capital: Breaches cost small business between $84,000 and $148,000 33% of firms required 3+ days to recover.
  • According to the FBI 84% of computer attacks are a inside job.

BECOME YOUR OWN BOSS


As a Certified Cyber Crime Consultant (C4), you qualify as a lifetime "National Cyber Security Affiliate." 


This includes weekly training, receiving free sales leads, learning how to create your own company, and taking the course "Learn How to Make Money in Cyber Crime Industry" for free.

Checklist

This course is taught as a self-paced online course and in a classroom setting.

  • Instruction by an expert facilitator

  • Online assistance

  • Specialized online manual and course materials

  • Personalized certificate as a Certified Cyber Crime Consultant

Cyber Crime Consultant &
Certified White Hat Hacker

Our Courses Provide You With A 3rd Path That's Faster, And You Do Not Need To Be A Convicted Felon.

Course Objectives

  • Effectively protect websites from being hacked. 
  • Demonstrate an understanding of professional, ethical and legal issues as it relates to cyber crime. 
  • Effectively investigate cyber extortion and cyber blackmail cases. 
  • Articulate oral and written skills necessary to develop company security policies. 
  • Effectively assess employee risks. 
  • Demonstrate an ability to perform penetration tests. 
  • Demonstrate an understanding of how internet scams are committed and how to investigate them. 
  • Demonstrate an ability to assess any business, or government agency on their physical and network vulnerabilities. 
  • Utilize techniques to effectively profile a cyber criminal. 
  • Demonstrate an ability to perform basic cell phone and tablet computer forensics. 
  • Understand how to teach parents about Online Child Safety.
  • Social Media investigation.
  • How to install and remove malware and viruses.
  • How to consult with entertainers, athletes, celebrities, small businesses, corporations and governments agencies.
  • How to start your own cyber security company.
  • How to market your skill sets.
  • How to build your own "Hacker For Hire" service legally. 
  • How to remove links from Google.

Course Curriculum

  • 1

    Getting Started

    • Support Chat/Forum

    • Download Security Definitions

    • What Every Cyber Security Consultant Should Have

    • Hacking Software

    • How Hard Is This Course

  • 2

    Ethics And Leadership

    • Understanding Your Role as a Certified Cyber Crime Consultant

    • Ethics In Cyber/Computer Security

    • 10 Leadership Qualities

    • Agent of the Government

    • Proof That Hacking Is Bigger Than All Drug Trafficking In The World!

    • Ethics and Leadership

  • 3

    Making A Great Cyber Security Consultant

    • Overview

    • What About The Geek Squad?

    • IT Manager, Computer Security Expert or Hacker

    • Having a Career In IT and/or Cyber Security

    • Basic Computer Problem

    • Jack Of All Trades

    • Don't Be Shy

    • Become A Teacher

    • Speak Less

    • The Basic Networking

    • System Admin Basics

    • Can You Trace A Network

    • Latency And Bandwidth

    • Do You Understand Script Writing

    • Backups Then Backup Again

    • Storing Your Password

    • Hard Work

    • Become A Project Manager

    • Understanding The Business Side

    • Don't Be Afraid To Debate

    • Always Have A Solutions

    • Ask Questions

  • 4

    Assessing Information Security Risk

    • Lesson Introduction

    • Identify the Importance of Risk Management

    • The Risk Equation

    • Risk Exposure

    • Risk Analysis Methods

    • Risks Facing an Enterprise

    • Quiz - Risk Management

    • Assess Risk

    • ESA Frameworks

    • ESA Framework Assessment Process

    • Cloud Considerations

    • The NIST Framework and Models

    • The COBIT Frameworks

    • The ITIL Model

    • The ISO Model

    • The SABSA Framework

    • TOGAF

    • System-Specific Risk Analysis

    • Risk Determinations

    • Guidelines for Assessing Risk

    • Quiz - Assessing Risk

    • Mitigate Risk

    • Classes of Information

    • Classification of Information into CIA Levels

    • Security Control Categories

    • Control Review Based on CIA Requirements

    • DoS Attack

    • Database Intrusion

    • Application of Controls That Address CIA Requirements

    • CVE

    • Extreme Scenario Planning and Worst Case Scenarios

    • Risk Response Techniques

    • Additional Risk Management Strategies

    • Continuous Monitoring and Improvement

    • IT Governance

    • Verification and Quality Control

    • Defense in Depth

    • Defense In Depth Strategy

    • Quiz - Mitigating Risk

    • Integrate Documentation into Risk Management

    • Policy Development

    • Process and Procedure Development

    • Topics to Include in Security Policies and Procedures

    • Topics to Include in Security Policies and Procedures

    • Learning The Policies

    • Information Custodians - Personal Data

    • Information Custodians - No Personal Data

    • Data Classifications

    • Purpose

    • Understanding Employee Risk

    • Description of the Information Security Sub-Policies

    • Policy on Employing Staff

    • Disciplinary Process

    • Controls and Processes

    • Policy on Departing Staff

    • Physical Security Overview

    • Physical Security Guidelines and Requirements

    • Physical Security Control

    • Internal Security Control

    • Security Incidents And Reporting

    • Remote Access

    • Third Party Access Control to the Network

    • Maintenance Contracts

    • Wireless Network

    • External Network Connections

    • Risk Assessment and Audit

    • Access Control to the Network

    • Data and Software Exchange

    • Malicious Software

    • Unauthorized Software

    • Secure Disposal or Re-use of Equipment

    • Security Monitoring

    • Training and Awareness

    • Reporting Data Security Breaches and Weaknesses

    • System Configuration Management

    • Disaster Recovery Plans

    • Unattended Equipment and Clear Screen

    • IT Department Responsibilities

    • Backup and Recovery Policy

    • 12 Security Best Practices for USB Drives

    • Contractors and Visitors

    • Information Security Policies For Employees

  • 5

    Security and Employee Policies

    • Understanding Employees Rights

    • Understanding Law Enforcement Concerns

    • Case Study - "Don't Believe What You See In The News"

    • Quiz 1 - Getting Started

  • 6

    Analyzing Reconnaissance Threats

    • Lesson Introduction

    • What Is Footprinting

    • Way Back Machine

    • Using Your Resources

    • Using Whois Lookups

    • Using DNS To Extract Information

    • Assess the Impact of Reconnaissance Incidents

    • Network and System Scanning Methods

    • Enumeration Methods

    • Variables Affecting Reconnaissance

    • Evasion Techniques for Reconnaissance

    • Additional Tools

    • Finding Your IP Address

    • Finding Network Ranges

    • Google Hacking

    • Mining For Information Using Google Hacking

    • Google Hacking Database

    • Overview Of Nmap

    • Performing Reconnaissance on a Network - Part 1

    • Performing Reconnaissance on a Network - Part 2

    • Quiz - Nmap 1

    • View The Nmap Manual.

    • Using What You've Learned....

    • Quiz - Nmap 2

    • Download Wireshark

    • Capturing and Analyzing Data with Wireshark

    • How Get Usernames And Passwords Accross The Network.

    • Quiz - Wireshark

  • 7

    Corporate Networks, Security And Environments

    • What Is A CIO?

    • What Is A CTO?

    • What Is A CISO

    • What Is A IT Manager?

    • How to Assess an IT Department

    • Passive Reconnaissance Using The Internet

    • Physical Security Breach

    • User Behaviod Analytics And Activity

    • Rogue IT Manager

    • Disabling The Windows Command Prompt

    • How to Disable USB Ports On Windows Machines

    • What You Need to Know About Firewalls - Student Taught

    • Example Of A Firewall

    • Software Firewall vs. Hardware Firewall Solutions

    • Intrusion Detection & Prevention

    • Example Of CISCO Intrusion Prevention System

    • The Difference Between A Server And A PC Part 1.

    • The Difference Between A Server and A PC Part 2.

    • Securing Corporate Sensitive Data

    • What Is a Proxy Server

    • How to Disable USB Ports - Mac OS

    • Steganography

    • Quiz

  • 8

    Personal Computer Security

    • 12 Signs A Personal Computer Has Been Hacked

    • Principles of Cybersecurity

    • Microsoft Windows Security

    • How To Secure Windows 10

    • Security Mac OS

    • Don’t Trust Your Neighbor’s Wi-Fi

    • Internet Security

  • 9

    Cyber Attacks

    • Types Of Attacks

    • What Is DoS And DDoS

    • DoS Attacks

    • Cyber Crime

    • Botnets

    • Attack Countermeasures - Flooding

    • By Passing The Hash

    • Pivoting Using Windows Remote Desktop

    • Clickjacking Threats

  • 10

    Cyber Crime Tips And Investigations

    • Why Cyber Crime Pays

    • Only The Rich Can Attain Cyber Crime Justice

    • Example Of Cyber Justice

    • Hacking In The Entertainment Industry

    • The Weakest Link

    • The Top 5 Places That People Think Will Never Be Hacked

    • Should A CEO Trust a Hacker Over His IT Department

    • Peeping Tom – Protecting Pictures on Computers and Cell Phones

    • The 5 Stages Of Computer Hacking

    • The 5 Stages Of Computer Hacking Part 2

    • Tracking An Attacker Using Shellbags

    • Finding Out What Your Working With On A Network

    • Recovering Deleted Data

    • Creating A System Image For Forensic Analysis

  • 11

    Cryptopgraphy

    • History Of Cryptography

    • Types Of Cryptography

    • Public Key

    • Certificates

    • Hashing

    • AES, DES And 3DES

    • SSL and TLS

    • SSH

    • Disk Encryption

    • Cryptographic Analysis

  • 12

    Social Engineering

    • How To Trace An IP Address

    • Overview Of Social Engineering

    • Social Engineering

    • Types of Social Engineering

    • Understanding Phishishing Scams And Social Engineering

    • Phishing And Delivery Media

    • Phishing and Common Components

    • Duplicate A Website

    • Assessing the Impact of Social Engineering

    • Quiz - Social Engineering

    • Social Engineering

  • 13

    Hacking With Hardware

    • WIFI PANEAPPLE - The Easiest Way To Hack Phones, Computers And Networks

    • Example Of Pineapple

    • Lan Turtle - How it works

    • Lan Turtle - Stealth Remote Access, Network intelligence Gathering

  • 14

    Cyber Insurance

    • Overview Of Cyber Insurance

    • Ten Things You Need To Know About Cyber Security Insurance

    • The Different Types Of Cyber Insurance

  • 15

    Malware

    • What Is Malware?

    • Ransomware Policies

    • How To Remove Ransomware

  • 16

    Pros and Cons Of Web Browsers

    • Web Browsers History, Bookmark and Cache Files

    • Which Web Browser Is Best For Security

    • Important Browsers Files

    • How can I protect my browser files

    • How To View Passwords In A Browser

    • Clickjacking Threats

  • 17

    The Dark Web

    • Inside The Dark Web

    • The Difference Between The Internet And The Dark Web

    • How To Access The Dark Web

    • Who Created the Dark Web?

    • Is It Really Anonymous?

    • How To Buy Products On The Dark Web

  • 18

    Password Security

    • Choosing The Right Password

    • Lie, Lie & Lie – Never Tell the Truth When Answering Security Questions

    • Passwords And Hashes

    • Force Password Changes

    • Can Changing Your Passwords Often May Be a Waste of Time

    • Resetting Your Password

    • Two-Factor Authentication

    • Example of 2 Key Authentication using gmail.com

    • USB Rubber Ducky - Take Social Engineering to the Next Level

    • Example Of USB Rubber Ducky

    • Using More Than One Email Account

    • Securing Your Online Password

  • 19

    Identity Theft

    • Case Study - Personal Security (Identity Theft)

    • Case Study - Medical Identity Theft

    • Identity Theft - Personal Security

    • Identity Theft - Medical Identity Theft

    • Identity Theft - Stats

    • Case Study - Credit Card Skimming

    • Case Study - Criminal Identity Theft

    • Case Study - Credit Freeze

    • Case Study - ID Theft Recovery

    • Identity Theft - Do It Yourself Identity Theft Recovery

    • Identity Theft - Tips for Avoiding Online Credit Card Fraud

    • Identity Theft - Criminal Identity Theft

    • Identity Theft - 5 Types of Credit Card Fraud

    • Identity Theft - Internet Security

    • Identity Theft - Credit Freeze / Security Freeze

    • Identity Theft - How Theives Can Steal Your Identity

    • Identity Theft - Credit Reports

    • Robo-Call Fraud

    • Phishing Scams

  • 20

    Scams & Schemes

    • Examples of the Top 10 Internet Scams

    • Case Study - Credit Report

    • Don’t Open That Email – Spear Phishing

    • Phishing Email Scam

    • Example - How To Perform A Phishing Attack

    • Internet Crime Reports

    • Internet Crime Prevention Tips

    • Switch-A-Roo

    • Watch What You’re Buying

    • What Can Go Wrong – Craigslist

    • Ebay - Hijacked Accounts

    • Hi-Tech Hustling On eBay

    • Second Chance Offers

    • Partial Refund

    • Paid Too Much for an Item

    • No item

    • Shill Bidding

    • Fakes

    • Hidden Shipping and Handling

    • Fake Money Orders and Bad Checks

  • 21

    Cell Phone Security

    • Cell Phone Security Overview

    • Apple OS vs. Google Android

    • Jailbreaking an iPhone

    • Password Protect Your Phone

    • Having Two Numbers Is Better Than One!

    • Did You Download An App With Spyware On Your Android?

    • How Do You Protect Yourself From NFC?

    • Don’t Trust Your Cell Phone With a Stranger

    • Don’t Trust Your Cell Phone With a Stranger

    • Bump & Hack - NFC Hacking

    • Protecting Your Android Phone & Tablet

    • Cell Phone Hacking

    • Voicemail Security

  • 22

    Cyber Bullying

    • Fighting Cyber Bullying

    • Cyber Bullying - Resources

    • Cyber Bullying - Social Media Stats

    • Cyber Bullying - Traditional Bullying

    • Cyber Bullying - Discrimination Stats

    • Case Study - Sexting And Cyber Bullying

    • Cyber Stalking - Stalking Using Technology

    • Case Study - Cyber Bullying

    • Cyber Stalking - Stats

    • Cyber Bullying - Workplace Bullying

    • Cyber Bullying - Things a School Can Do to Fight Cyber Bullying

    • Bullies vs. Cyber Bullies

    • Be Strong

    • Facts & Myths About Bullies and Cyber Bullies

    • Case Study - Cyber Bullying Tips | Owning Your Own Name

  • 23

    Social Media Investigation

    • Social Media Investigations - What You Need To Know Before Getting Started

    • How to Create A Sock Puppets - Part 1

    • How To Create A Sock Puppets - Part 2

    • Social Media Investigation - Quick Tools & Websites For Investigations

    • Social Media Attacks & Hacks

    • Social Media Investigation - Facebook Reference Links

    • Social Media Investigation - Tracking A Target On Facebook

    • Getting Started With The Dark Web - Part 1

    • Getting Started With The Dark Web - Part 2

    • The Do's and Don'ts of The Dark Web

    • What You Need To Know

  • 24

    Child Saftey And Security

    • Child Safety Stats

    • Protecting Our Children

    • Case Study - How and Why You Should Install Spyware On Your Kids Computers

  • 25

    The Business Side Of Cyber Security

    • What Is the Organizational Structure

    • What You Must Do to Be Successful in the World of Business.

    • Common Ethical Concerns that Arise in the Business World.

    • How to Start a Corporation

    • Standing Out in the Cyber Security Industry

    • How to Market in the Cyber Security Industry

    • How to Sell Your Services Around the World

  • 26

    Final Exam

    • Final Exam

All Students Will Receive A Certificate As A
"Certified Cyber Crime Consultant"

This course is recognized by government and corporation around the world.
Click Here More Information!

Learn How To Become A Spy

Learn how to install surveillance software (spyware) on your clients computers, to find employees who maybe stealing company intellectual property.

Learn Counter Surveillance

As Certified Cyber Crime Counsultant, you will learn counter surveillance which includes sweeping homes, offices and cars.

Included In This Course

WIFI PINEAPPLE NANO

The WiFi Pineapple lets pentesters perform targeted man-in-the-middle attacks, advanced reconnaissance, credential harvesting, open source intelligence gathering and more – all from a clean, intuitive web interface.

Included In This Course

USB RUBBER DUCKY

Imagine you could walk up to a computer, plug in a seemingly innocent USB drive, and have it install a backdoor, exfiltrate documents, steal passwords or any number of pentest tasks.

Pricing options

Download The National Cyber Security University App For Discount Codes.