• Online, Self-Paced
Course Description

This course is for people who have completed modules 1-5 or have a good understanding of cryptocurrencies. Advanced cryptocurrency analysis will broaden your understanding of the bitcoin transaction protocol and how transactions are associated by using clustering methods. We will explore the many ways in which crypto users can leverage technology to obfuscate their payment trails. This course will also examine evolving protocols that will likely impact Bitcoin, events that have led up to their development, and what protocols the Bitcoin community is moving away from.

Learning Objectives

Understand evolving protocols that will likely impact Bitcoin, events that have led up to their development, and what protocols the Bitcoin community is moving away from.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Investigation
  • Digital Forensics
  • Threat Analysis

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.