Open Source Intelligence Certificate.

Really a great and affordable OSINT course provided by https://www.inteltechniques.net/courses/open-source-intelligence

The course did really upgrade my SOCMINT techniques and it also improved my investigational approach and skill set.

OSINT

Totally off-topic is this course: https://microexpressionstrainingvideos.com/

Took me a few to nail the test but I am now scoring a steady 80% or more on average now. The 79 Euro course does not come with a certificate but you can keep track of your scores. The goal of this course was to improve my communication skill set.

 

Introduction to Bitcoin Investigation

This course from the EC-Council University hits the fundamentals it is an interesting course.

I recently got interested in tracking bitcoin payments after getting a few of these spammy emails that my computer was hacked and I was recorded and these recordings would be released if I did not cough up some money.

The above-mentioned course is ideal to track such criminals.

Useful links for your investigation are

Introduction to Bitcoin Investigation

 

Identifying Web Attacks Through Logs

A course that touches upon the fundamentals of analyzing logs.

  • Identify Key information on web server logs
  • Identify malicious actions analyzing logs
  • Identify web attacks after analyzing logs

There are multiple types of web attacks. This course will review these attacks and teach you how to use the web application logs to identify them. To do this, the student will need to learn how to read a log and how to extract some of the key information from the log.
Subsequently, this first analysis of real-world web server log examples will be used to get a better understanding of the attack. We will also use some scripts to find the information faster.
Following the log analysis of the web attacks, students will learn about some of the networks that can affect the web application like DDOS (Distributed Denial of Service) and other types of flooding. Later with the completion of the course, the student should be able to read a web application log originated from the web server and identify some of the most common web attacks.\\

cybrary-cert-identifying-web-attacks-through-logs