From reliability rating methods to the most dangerous schemes of cybercrime
What will you get after you complete the training course?
Access to detect.expert services during the training
*Duration of the full training course
The skill of making money out of thin air. Just joking. You’ll be able to think the way cybercriminals do, see the weaknesses of services, and help prevent fraud.
We analyze all main identifiers of the browser, the operating system, the hardware and the network, and analyze the anomalies and the formation principle.
Assessment of the social rating, email, phone number, payment data, and username, verification of profile photo and much more, along with identifiers, allows detecting multi-accounting and ban the previously blocked users or impose restrictions on a certain category of users.
It is primarily aimed at identifying suspicious activity and preventing fraud. It complements analysis of identifiers and user data.
OSINT for antifraud systems penetration testing
To pentest antifraud systems, one has to be able to check data for assessing. This block will let you to feel like a cyber detective and learn to apply many useful tools.
"Let's look under the hood" — we will describe some popular antifraud systems, for example, GeoComply, Sift, Seon, Stripe, and others. You will be able to connect these systems, choose proper solutions, and know the strengths and weaknesses of each of them.
Bypassing antifraud systems
It is the most interesting block, where we will analyze all solutions for bypassing: anti-detection, warm-up, rating cheat, document rendering, IP and DNS spoofing, and much more.
Monetization of knowledge
We will tell you how to legally make money on the vulnerabilities found using Bug bounty applications and how to generate a portfolio; we will discuss several areas where you can monetize your knowledge.
*Depending on the plan chosen
Schemes of cybercrime
If you try to follow these schemes, you may end up in jail, since the temptation to make a lot of money will be great. Being a security professional, you have to know them as they explain what vulnerabilities cybercrime exploits in order to check them during a security audit.
Not available on all plans
There are numerous myths about MacOS. We will analyze both methods of device anonymizing and methods of modifying devices for multi-accounting. The training course will be in accordance with the directives used by US intelligence agencies (original documents will be provided).