The first module in the Advanced CCI+ Certification Course
Advanced Cryptocurrency Concepts
Learn about the latest Bitcoin improvement protocols and discover how cryptocurrency users enhance their anonymity. Get to understand the most predominant methodologies used to trace illicit activity and de-anonymize them.
DEX and DeFi
The Biggest Hacks
This Module Covers:
The Advanced Cryptocurrency Concepts Module contains 4 lessons.
Atomic Swaps and Common-Input Heuristics
In lesson one of this module, we discuss the process of atomic swaps and Hashed Timelock Contracts. Atomic swaps are often used as an obfuscation method to enhance their privacy and conduct trustless means of trading.
This lesson also covers Common-Input Heuristics, which is the clustering (deanonymizing and grouping) of addresses and transactions.
Main Topics: Atomic Swaps, HTLC’s (Hashed Timelock Contracts), Common-Input Heuristics, and some technical basics for Bitcoin.
Coinjoin, Wasabi, Schnnor, and Dandelion
In lesson two, we discuss what coinjoin is, how it is beneficial to users of cryptocurrency, and the major service providers of coinjoin. We also examine three Bitcoin Improvement Protocols (BIPs), which will enhance privacy, accelerate transaction computation speed, and save space on the blockchain if successfully implemented.
We also cover The Dandelion Protocol which further obfuscates the tracing of IP addresses via nodes and thwarts the efforts of cryptocurrency deanonymization techniques.
Main Topics: Coinjoin, Major Coinjoin Servicers (Wasabi, Samurai Wallet), Bitcoin Improvement Protocols Taproot and Schnoor, The Dandelion Protocol
Tether, Omni Layer, and the Lightning Network
In lesson three of this module, we cover the Omni Layer and its uses in today’s world. We also look at how Tether and other token asset transactions on the Omni Blockchain Explorer can be investigated and what clues an investigator should keep in mind.
This lesson also covers the Lightning Network and the benefits and drawbacks of Sidechains and Payment Channels.
Main Topics: Omni Layer, Tether, Omni Blockchain Explorer, Lightning Network, Sidechains, and Payment channels
Tainted Coin Tracing Methods
In lesson four of this module, we go over the five primary methodologies used in tracing potentially illicit activity via “tainted” coins. The five methods include First in, First Out (FIFO), Last In, First Out (LIFO), the Poison Method, the Haircut Method, and the Taint In, Highest Out (TIHO) method.
We then cover the drawbacks and advantages of each method and how to use them concurrently.
Main Topics: FIFO, LIFO, TIHO, Haircut, and Poison Methods, Theory of Tracing Tainted Coins.
Certified Crypto Investigator Training
Need a refresher or looking to start with something easier? Our self-paced introductory course contains 5 modules. Pass the final exam to become a Certified Crypto Investigator.
The regular CCI course covers: