fbpx
Select Page

Advanced CryptoCURRENCY CONCEPTS

Discover the different ways in which users of cryptocurrency attempt to enhance their anonymity and promote financial trail obfuscation. Learn the developments in bitcoin’s protocol that are changing the crypto eco-sphere and the predominant methodologies used for investigations in the cryptocurrency space.

The first module in the Advanced CCI+ Certification Course

Earn your Advanced CCI+ Certification by completing all advanced modules. Existing CCI members get 25% off. Email us for your discount code.

Advanced Cryptocurrency Concepts

 Learn about the latest Bitcoin improvement protocols and discover how cryptocurrency users enhance their anonymity. Get to understand the most predominant methodologies used to trace illicit activity and de-anonymize them.

$399

Advanced Ethereum

 [Coming Soon]

s

DEX and DeFi

 [Coming Soon]

i

The Biggest Hacks

[Coming Soon]

This Module Covers:

The Advanced Cryptocurrency Concepts Module contains 4 lessons. 

Atomic Swaps and Common-Input Heuristics

In lesson one of this module, we discuss the process of atomic swaps and Hashed Timelock Contracts. Atomic swaps are often used as an obfuscation method to enhance their privacy and conduct trustless means of trading.

This lesson also covers Common-Input Heuristics, which is the clustering (deanonymizing and grouping) of addresses and transactions.

Main Topics: Atomic Swaps, HTLC’s (Hashed Timelock Contracts), Common-Input Heuristics, and some technical basics for Bitcoin.

Coinjoin, Wasabi, Schnnor, and Dandelion

In lesson two, we discuss what coinjoin is, how it is beneficial to users of cryptocurrency, and the major service providers of coinjoin. We also examine three Bitcoin Improvement Protocols (BIPs), which will enhance privacy, accelerate transaction computation speed, and save space on the blockchain if successfully implemented.

We also cover The Dandelion Protocol which further obfuscates the tracing of IP addresses via nodes and thwarts the efforts of cryptocurrency deanonymization techniques.

Main Topics: Coinjoin, Major Coinjoin Servicers (Wasabi, Samurai Wallet), Bitcoin Improvement Protocols Taproot and Schnoor, The Dandelion Protocol

Tether, Omni Layer, and the Lightning Network

In lesson three of this module, we cover the Omni Layer and its uses in today’s world. We also look at how Tether and other token asset transactions on the Omni Blockchain Explorer can be investigated and what clues an investigator should keep in mind.

This lesson also covers the Lightning Network and the benefits and drawbacks of Sidechains and Payment Channels.

Main Topics: Omni Layer, Tether, Omni Blockchain Explorer, Lightning Network, Sidechains, and Payment channels

Tainted Coin Tracing Methods

In lesson four of this module, we go over the five primary methodologies used in tracing potentially illicit activity via “tainted” coins. The five methods include First in, First Out (FIFO), Last In, First Out (LIFO), the Poison Method, the Haircut Method, and the Taint In, Highest Out (TIHO) method.

We then cover the drawbacks and advantages of each method and how to use them concurrently.

Main Topics: FIFO, LIFO, TIHO, Haircut, and Poison Methods, Theory of Tracing Tainted Coins.

Sign Up Today for $399.

Existing CCI members get 25% off – Email us at trainingsupport@blockchaingroup.io for your discount code.

 

Take a deeper dive into some advanced cryptocurrency concepts and further your skills as a professional. Complete all Advanced Modules to earn your Advanced CCI+ Certification.

 

Need an introductory course first? Take our regular CCI training instead.

 

Purchase NowRegular CCI Course

Certified Crypto Investigator Training

Need a refresher or looking to start with something easier? Our self-paced introductory course contains 5 modules. Pass the final exam to become a Certified Crypto Investigator.

The regular CCI course covers:

The basics of cryptocurrency, what it is and how it works

How Dark Web marketplaces and cryptocurrencies work together

Understand blockchain technology and how to spot illicit activity

How crypto can be used in legitimate and illicit activities

Real-world investigation tactics and tools to analyze crypto crimes

Earn the credentials of a Certified Cryptocurrency Investigator