Course Outline
At the end of this course you will be able to:
- Use advanced search engine techniques and features
- Identify websites for finding information on people and companies
- Analyze website source code for investigative purposes
- Use deep websites and directories
- Understand internet infrastructure and its use intelligence gathering and investigation
- Explain the digital footprint is left when online and the dangers associated
- Use social media for investigation, intelligence and geolocation
- Describe the best open source software to use for investigations
- Access influential internet communities
- You will also have an introduction to the Dark Web, criminal innovation and cybercrime
- Advanced search engine techniques and Google hacking
- How to describe the ways mobile devices can cause and opportunity and risk
- Tracking mobile devices
- Advanced software required for safe internet investigations
- How to use open source encrypted anonymity services
- Familiarity with use of Tor and accessing Tor Hidden Services (THS) and other Dark Webs
- How Virtual currencies work, particularly Bitcoin
Requirements
Basic understanding of computers and the internet.
Testimonials
His way of thinking
MediaSci
Ann is very knowledgeable on the subject. She is constantly varying pace according to the feedback. There is a lot of room for discussing attendee's own experiences. It was a great joy !.
Sjoerd Hulzinga - KPN p/a Bloomville
It was quite informal.
- Capita Business Services Ltd
Trainer covered a lot of ground over a relatively short period.
- Capita Business Services Ltd
I found it very interesting to learn all about what happens behind the scenes when it comes to IT systems. I also enjoyed learning about security and what hackers do as ethical hacking is an avenue I'm very keen in pursuing.
- Knowledge Pool/ DVLA
Richard was very knowledgeable in his field.
- Knowledge Pool/ DVLA
It was pitched at the right level - challenging but understandable & informative.
Louise Voisey - Capita Business Services Ltd
Hacking
Mohalmald Salim - PSO
Level of expertise from the trainer Use case examples
Pierre Maillot - Bosch
His deep knowledge of the IoT topic.
Bosch
Ron's experience on how to successfully implement IoT projects and the deep technical subjects covered.
Bosch
relevance of content to our I4.0 business environment
Bosch
Very knowledgeable trainer, was able to adjust to audience knowledge, excellent industry experience and ability to relate to audience needs Excellent content preparation , tailored to needs discussed beforehand. Good supplement reading materials prepared by trainer
Oliver Steinig - Bosch
Ron was very mindful of his audience and addressed everyone's questions. He checked his audience for clarity and was willing to spend the time to review a topic until everyone understood the topic. He gauged the audience for energy levels and suggested a break when he saw that the energy from the group was waning. This was much appreciated.
Bosch
The pace of training delivery.
Ian McInally - KnowledgePool
the exercises and group discussions.
KnowledgePool
The trainer was very knowledgeable and was happy to go at the pace of the attendees. He was polite and respectful to all those in attendance. I felt I learnt a lot from the course as the trainer was very succinct in his delivery when going through the PP slides. A really good, worth while course from my personal point of view.
Julie Price - KnowledgePool
The environment was really relaxed and open so everyone could ask questions or put across points of view or experience. David the trainer was a SME on the subject and his style was very good.
KnowledgePool
Tutorials
ICAO
The example and exercise
ICAO
I got more information regarding the web applications' security issues, the different tools that could be used to cope with these issues, and more advice from the trainer to handle all these issues.
ICAO
the list of tools
ICAO
how it was broken into the technical and security mindset aspects.
ICAO
Excercises.
ICAO
he is very knowledgeable and comprehensive.
ICAO
Matthew was very knowledge and has lot experience to share with us. it was very pleasant, as he take the time to listen to us and answer to our questions. Thank you Matthew, it was awesome.
ICAO
The second day, scenarios exercises.
Christina Hutchings - KnowledgePool
The real life examples Ron gave.
Bosch
I liked the trainer's introduction and anecdotes to make the learning more real
KnowledgePool
David's in depth knowledge. His relationship building skills with the audience. I really enjoyed the way he managed to make us (as a collective audience) enjoy the quite dry and uninteresing subject matter. He had anecdotes and knowledge of specific examples of security failings - hacker attacks - BCP 'breakdowns' etc which put flesh on the bones to the piece of legislation or 'best practice' for BCP that he was trying to teach us about. A really engaging, down to earth and personable man: A very good listener and a fabulous, charismatic trainer.
Cris Bollin - KnowledgePool
All is excellent
Manar Abu Talib - Dubai Electronic Security Center
- Understanding that ATT&CK creates a map that makes it easy to see, where an organization is protected and where the vulnerable areas are. Then to identify the security gaps that are most significant from a risk perspective. - Learn that each technique comes with a list of mitigations and detections that incident response teams can employ to detect and defend. - Learn about the various sources and communities for deriving Defensive Recommendations.
CHU YAN LEE - PacificLight Power Pte Ltd
He took his time to make sure everyone understood and were on the same wave length
Tina Hopkins - Capita Business Services Ltd
I found the training too in depth for IT beginners. There was too many high level subjects that i felt were too advanced for a beginner level.
Capita Business Services Ltd
Related Courses
Advanced PHP and Secure Coding Course
35 hoursParticipants attending this course will Understand basic concepts of security, IT security and secure coding Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them Learn client-side vulnerabilities and secure coding
BeyondCorp: Implementing Zero Trust Security
14 hoursBeyondCorp is an open source Zero Trust security framework that allows employees to work securely from any location without the need for a traditional VPN. In this instructor-led, live training, participants will learn hands-on how to set up a
Cyber Crisis & Communications Planning
7 hoursThis course discusses how to manage an incident response team, how the first responder act, given the frequency and complexity of today's cyber attacks, incident response is a critical function for organizations. Incident response is the
Ethical Hacker
35 hoursThis class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the
Understanding Modern Information Communication Technology
7 hoursThis course covers the basic concepts of security and IT Security, with an emphasis on defending against network attacks. Participants will gain an understanding of essential security protocols and security concepts of web services. Recent attacks
Automotive Cyber Security Fundamentals
21 hoursAutomotive refers to the securing of automotive electronic systems, communication networks, control algorithms, software, users, and underlying data from malicious attacks, damage, unauthorized access, or manipulation. This instructor-led, live
Business Continuity Practitioner
14 hoursThis course is designed to help the attendee to build organizational resilience against a range of threats so that organizations can respond effectively to incidents, maintain the availability of business operations and safeguard its
CAS for Administrators
7 hoursCAS, or Central Authentication Service, is an open-source, enterprise-level, single-sign-on protocol for the web. CAS gives users access to multiple applications using a single sign-on and allows web applications to authenticate users without giving
Certified Ethical Hacker
35 hoursObjectives: To prepare the student for the Ethical Hacking and Countermeasures examination. On passing this examination you will be awarded the Certified Ethical Hacker certification Target Audience: This course will significantly benefit
IoT Security Architecture
14 hoursInternet of Things (IoT) is a network infrastructure that connects physical objects and software applications wirelessly, allowing them to communicate with each other and exchange data via network communications, cloud computing, and data capture.
NetNORAD
7 hoursNetNORAD is a system built by Facebook to troubleshoot network problems via end-to-end probing, independent of device polling. In this instructor-led, live training, participants will learn how NetNORAD and active path testing can help them
Network Security Administrator
35 hoursAudience: System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.
Open Source Intelligence (OSINT) Advanced
21 hoursOpen Source Intelligence (OSINT) refers to any information that can legally be gathered from free, public sources about an individual or organization. OSINT also refers to the process of collecting this data, analyzing it, and using it for
Web Security with the OWASP Testing Framework
28 hoursThe Open Web Application Security Project (OWASP) is an online community that creates freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security. OWASP offers web security testing
Shadowsocks: Set Up a Proxy Server
7 hoursShadowsocks is an open-source, secure socks5 proxy. In this instructor-led, live training, participants will learn how to secure an internet connection through a Shadowsocks proxy. By the end of this training, participants will be able