Webinar: Blockchain Hacking for Investigating Cryptocurrencies on Oct 24 2018
Register Now to Learn Blockchain Hacking Step-by-Step!
Nick Furneaux, forensics trainer, investigator & author of “Investigating Cryptocurrencies” takes you through a journey of code and tools to unpick the movement of illegal funds through the blockchain during this fascinating, FREE EH-Net Live! webinar on Wednesday October 24, 2018 at 1:00 PM US Eastern. Join us live to learn how to win free copies of his book!
Follow the money. Be it business, politics or crime, this is a common method of trying to find out who’s involved and their motivations. In the world of cyber crime, bad actors use cryptocurrencies for the innate security of the blockchain and the supposed anonymity that comes with it. But as with any investigation, if you look hard enough, there’s always breadcrumbs left behind. Somehow, someway, there’s always a paper/electronic trail back to a human in the real world. Join Nick Furneaux, author of “Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence”, for an eye-opening presentation with live demos on how to break through the wall and get to the data your investigation needs.
Agenda for “Blockchain Hacking for Investigating Cryptocurrencies”:
Note: Subject to Change
- Intro by Don Donzal, EH-Net Editor-in-Chief
- Preso by Nick Furneaux of CSITech, Ltd.
- About Nick
- Blockchain 101
- Cryptocurrency Basics
- Intro to Digital Forensics Investigations
- Morphing into a New Methodology
- Cryptocurrency Forensic Investigator’s Toolkit
- Live Demo
- Career Opportunities
- Building Your Skillset
- Post Game on EH-Net in the “Blockchain Group“
Although this is a free event, registration is required. Capacity is limited so join early. Our virtual doors to the webinar open 30 minutes before the scheduled start time. Feel free to invite your friends and colleagues that might also be interested in Blockchain Hacking.
EH-Net Live! October 2018 – Guest Bio
*** This is a Security Bloggers Network syndicated blog from The Ethical Hacker Network authored by Don Donzal. Read the original post at: http://feedproxy.google.com/~r/eh-net/~3/bRYp7br-ClA/