Only for law inforcement

Cyber Investigator Course

Learn how to interpret data to catch criminals operating in the dark web and on underground forums
Format
Online, offline (private groups only)
Duration
2 days
Level
Advanced
Language
English
English
Arabic
Arabic

Target participants

Investigation officers

Strengthen operational security and investigative skills to manage anonymous identities, and conduct structured investigations across open and underground sources.

Intelligence analysts

Perform advanced deanonymization and infrastructure correlation by analyzing IP infrastructure, VPNs, proxies, Cloudflare-protected assets, and reused attacker infrastructure.

Digital forensics examiners

Enhance underground investigation capabilities through dark web monitoring, hacker community analysis, communication channels and social media investigations, cryptocurrency tracking, and active intelligence gathering.

Course modules

Security and anonymity
  • Configuring systems to reduce digital footprints
  • Managing anonymous accounts
  • Evading tracking and spyware
Investigation into dark web forums
  • Structure of cybercrime communities
  • Monitoring relevant topics and correlating posts
  • Active intelligence and deanonymization
Investigation into communication channels
  • Monitoring chats and channels in Telegram
  • Identifying administrators and bots
  • Deanonymization techniques
Social media analysis
  • OSINT and GEOSINT techniques to find administrators of social network accounts
  • Enriching investigations with leaked databases
Network infrastructure analysis
  • Identifying hosting types and IP roles
  • Enriching IP and domain data
  • Finding IPs behind Cloudflare
  • Correlating reused infrastructure
Cryptocurrency transaction analysis
  • Identifying mixers and swap services used by threat actors
  •  Using Telegram and dark web sources for wallet tracking
AI for OSINT
  • Using the AI OSINT tool to automate investigation and validate results provided by AI.
  • Identifying ChatGPT generated text and images generated by AI.
Investigation of cyber attacks
  • Methodologies to investigate data leaks, DDoS attacks, phishing, Android trojans, and BEC attacks
Course certificate
At the end of the course, you will receive a personal certificate confirming your expertise and strengthening your professional credibility
Cyber Investigator
Trainers
Daria Shcherbatyuk Group-IB
Daria Shcherbatyuk
Graph Product Owner
Daria Shcherbatyuk

Daria is a Cybercrime Investigation Specialist and Product Owner of the Group-IB Graph, an advanced investigation platform for uncovering cybercriminal infrastructure. With over six years of experience in threat hunting, OSINT, and digital forensics, she has taken part in investigations into phishing, cryptocurrency thefts, and business email compromise attacks worldwide. As a frequent speaker at cybersecurity events, she actively promotes digital hygiene, OSINT practices, and investigative tools within the  community.

Anna Yurtaeva
Anna Yurtaeva
Head of High-Tech Crime Investigation, META
Anna Yurtaeva

Over eight years, Anna has successfully conducted more than 100 high-tech cybercrime investigations, including DDoS and ransomware attacks, data leaks, and phishing campaigns. In some cases, her results have led to the apprehension of cybercriminals.

As a cyber detective, Anna effectively uses Group-IB’s advanced technologies and in-depth knowledge of OSINT techniques.  It allows her to securely investigate the ever-changing tactics of threat actors.

Anna has experience in conducting highly-engaging training sessions in which she makes every participant feel like they are a professional investigator.

Jennifer Soh Group-IB
Jia Hwei Soh
Head of High-Tech Crime Investigation, APAC
Jia Hwei Soh

Jia Hwei Soh leads cybercrime investigations across the Asia-Pacific region at Group-IB, with over 10 years of experience spanning threat intelligence, digital forensics, and incident response. She has played a key role in high-profile international operations with INTERPOL and regional law enforcement, including investigations into business email compromise, phishing platforms, and infostealer infrastructure.

Jia Hwei holds multiple industry certifications, including CISSP and several GIAC credentials, and is widely recognized for her contributions to cybercrime investigations and regional cybersecurity collaboration.

Prev
Next
Why choose
Group-IB training
50+
50+
countries
where we deliver
training programs
6,000+
6,000+
students
have taken part in
our training courses
15+
15+
expert trainers
with hands-on
experience
Multi-disciplinary expertise
Multi-disciplinary expertise
in fraud prevention, investigations, DFIR, consulting, and red teaming
4
4
Group-IB products
integrated into training for realistic experience
90%
90%
satisfaction rate
among participants

Ready to upskill your cybersecurity expertise?

Join thousands of cybersecurity professionals who have advanced their careers
with Group-IB’s expert-led training