Course Outline

At the end of this course you will be able to:

  • Use advanced search engine techniques and features
  • Identify websites for finding information on people and companies
  • Analyze website source code for investigative purposes
  • Use deep websites and directories
  • Understand internet infrastructure and its use intelligence gathering and investigation
  • Explain the digital footprint is left when online and the dangers associated
  • Use social media for investigation, intelligence and geolocation
  • Describe the best open source software to use for investigations
  • Access influential internet communities
  • You will also have an introduction to the Dark Web, criminal innovation and cybercrime
  • Advanced search engine techniques and Google hacking
  • How to describe the ways mobile devices can cause and opportunity and risk
  • Tracking mobile devices
  • Advanced software required for safe internet investigations
  • How to use open source encrypted anonymity services
  • Familiarity with use of Tor and accessing Tor Hidden Services (THS) and other Dark Webs
  • How Virtual currencies work, particularly Bitcoin

Requirements

Basic understanding of computers and the internet.

  7 Hours
 

Testimonials

Related Courses

Advanced PHP and Secure Coding Course

 35 hours

Participants attending this course will Understand basic concepts of security, IT security and secure coding Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them Learn client-side vulnerabilities and secure coding

BeyondCorp: Implementing Zero Trust Security

 14 hours

BeyondCorp is an open source Zero Trust security framework that allows employees to work securely from any location without the need for a traditional VPN. In this instructor-led, live training, participants will learn hands-on how to set up a

Cyber Crisis & Communications Planning

 7 hours

This course discusses how to manage an incident response team, how the first responder act, given the frequency and complexity of today's cyber attacks, incident response is a critical function for organizations. Incident response is the

Ethical Hacker

 35 hours

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the

Understanding Modern Information Communication Technology

 7 hours

This course covers the basic concepts of security and IT Security, with an emphasis on defending against network attacks. Participants will gain an understanding of essential security protocols and security concepts of web services. Recent attacks

Automotive Cyber Security Fundamentals

 21 hours

Automotive refers to the securing of automotive electronic systems, communication networks, control algorithms, software, users, and underlying data from malicious attacks, damage, unauthorized access, or manipulation. This instructor-led, live

Business Continuity Practitioner

 14 hours

This course is designed to help the attendee to build organizational resilience against a range of threats so that organizations can respond effectively to incidents, maintain the availability of business operations and safeguard its

CAS for Administrators

 7 hours

CAS, or Central Authentication Service, is an open-source, enterprise-level, single-sign-on protocol for the web. CAS gives users access to multiple applications using a single sign-on and allows web applications to authenticate users without giving

Certified Ethical Hacker

 35 hours

Objectives: To prepare the student for the Ethical Hacking and Countermeasures examination. On passing this examination you will be awarded the Certified Ethical Hacker certification Target Audience: This course will significantly benefit

IoT Security Architecture

 14 hours

Internet of Things (IoT) is a network infrastructure that connects physical objects and software applications wirelessly, allowing them to communicate with each other and exchange data via network communications, cloud computing, and data capture.

NetNORAD

 7 hours

NetNORAD is a system built by Facebook to troubleshoot network problems via end-to-end probing, independent of device polling. In this instructor-led, live training, participants will learn how NetNORAD and active path testing can help them

Network Security Administrator

 35 hours

Audience: System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.  

Open Source Intelligence (OSINT) Advanced

 21 hours

Open Source Intelligence (OSINT) refers to any information that can legally be gathered from free, public sources about an individual or organization. OSINT also refers to the process of collecting this data, analyzing it, and using it for

Web Security with the OWASP Testing Framework

 28 hours

The Open Web Application Security Project (OWASP) is an online community that creates freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security. OWASP offers web security testing

Shadowsocks: Set Up a Proxy Server

 7 hours

Shadowsocks is an open-source, secure socks5 proxy. In this instructor-led, live training, participants will learn how to secure an internet connection through a Shadowsocks proxy. By the end of this training, participants will be able