2 days10 a.m. - 4 p.m.

Cyber Investigator

A practical training course on investigating cybercrimes, detecting adversary infrastructure, and monitoring traces left by hackers in cyberspace.

About the course

Each and every cybercrime is a tangled web of information scattered around the Internet. The role of a specialist in hi-tech cybercrime investigations is to untangle that web and figure out what happened. Doing so requires special training and a wide range of skills.

Our Cyber Investigator course will tell you all you need to know about working as a cyber investigator and teach you the skills you need to investigate highly complex cases.

Practical exercises will help you become familiar with the relevant methods and techniques. To round off the course, you will take part in an investigation based on real-life events that will consolidate your skills and give you invaluable experience that will become part of your career path.

Course program

The intensive two-day course run by Group-IB experts will introduce you to the technologies and tools required to carry out cybercrime investigations.

The training course will include demonstrations of how to analyze various types of attack and practical exercises on examining adversary infrastructure.

Day 1

On the first day, you will learn what happens at the start of investigations into various types of cyberattack, such as unauthorized access to networks, breaching corporate websites, phishing, and ransomware attacks. We will also look at the principles behind working with data and discuss how to correctly store and update information uncovered during an investigation.

Next, we will share useful advice on how to search for missing data in open sources. You will also become familiar with the key tools and solutions designed to help investigate cyberattacks and monitor adversary infrastructure.

Day 2

On the second day, we will talk about anonymization and deanonymization techniques using TOR, VPN, proxies, and other tools. After that, we will discuss the methods involved in investigating the dark web and look at the most popular websites and forums as well as how to monitor cybercriminal activity on such resources.

The day will end with practical exercises during which you will have the opportunity to test your skills in investigating cybercrimes and attributing cybercriminals, with support and guidance from Group-IB experts.

What will you learn as part of the course?

  • How to examine adversary infrastructure using open-source data
  • How to investigate the most common types of hacker attacks
  • How to analyze information from the dark web
  • How to identify digital traces left by cybercriminals
  • How to track cryptocurrency transactions
Who can benefit from this course?
  • Technical specialists with experience in IS
  • IS specialists
  • Heads of IS and IT departments

What you’ll receive

  • Lecture videos and practical materials used during training
  • Personal certificate of completion
  • Valuable information that you can put into practice

Why Group-IB?

Experience in international investigations

Our training courses are based on 1300+ successful investigations worldwide.

Technical expertise

All courses are led by GCFA-, EnCE- and MCFE-certified experts.

Practicing experts

The course instructors are current Group-IB specialists, which translates to the most up-to-date and first-hand information for course participants.

Stimulating practical training

Practical exercises based on real-life cases make up 70% of the course.

Continuously updated program

Course materials are regularly updated with new cases from Group-IB’s experience, which ensures that the course program always reflects the latest trends.

Comprehensive development

Group-IB’s training courses provide a wide range of competencies for creating an effective information security department in any company.

Book a consultation with a specialist

Contact us if you would like to find out more about Group-IB’s Cyber Investigator course

Get new report
Ransomware Uncovered 2021/2022

The well-known complete guide to the latest tactics, techniques, and procedures of ransomware operators based on MITRE ATT&CK®


We use cookies on the website to make your browser experience more personal, convenient and secure. You may block or manage the use of cookies, however, in some cases they’re essential to make this site work properly. Learn more about cookies in Group-IB Privacy And Cookies Policy.