Course Outline
At the end of this course you will be able to:
- Use advanced search engine techniques and features
- Identify websites for finding information on people and companies
- Analyze website source code for investigative purposes
- Use deep websites and directories
- Understand internet infrastructure and its use intelligence gathering and investigation
- Explain the digital footprint is left when online and the dangers associated
- Use social media for investigation, intelligence and geolocation
- Describe the best open source software to use for investigations
- Access influential internet communities
- You will also have an introduction to the Dark Web, criminal innovation and cybercrime
- Advanced search engine techniques and Google hacking
- How to describe the ways mobile devices can cause and opportunity and risk
- Tracking mobile devices
- Advanced software required for safe internet investigations
- How to use open source encrypted anonymity services
- Familiarity with use of Tor and accessing Tor Hidden Services (THS) and other Dark Webs
- How Virtual currencies work, particularly Bitcoin
Requirements
Basic understanding of computers and the internet.
Testimonials
The course was very informative and I now have a greater understanding of "open source" intelligence; information about our security posture which is openly available.
Mark Hanvey - Khadijah Ukadia, KPMG LLP
As I had no prior knowledge of the topic being delivered, the course included a good balance of detail for complete novices and more experienced and knowledgeable attendees.
Sue Croker - Khadijah Ukadia, KPMG LLP
As I had no prior knowledge of the topic being delivered, the course included a good balance of detail for complete novices and more experienced and knowledgeable attendees.
Sue Croker - Khadijah Ukadia, KPMG LLP
I enjoyed the lecturers sense of humour
Khadija Ukadia, KPMG LLP
Good informative snippets of information about how information can be found.
Khadija Ukadia, KPMG LLP
finding out what can be looked for
Khadija Ukadia, KPMG LLP
Overall, the subject matter was appealing and interesting and certainly opened my eyes to my own security on-line and what can be accessed with relative ease and without fancy tools.
Dean Secombe - Khadija Ukadia, KPMG LLP
The trainers knowledge - really interesting content and practical examples
Tracey Rollock
Piotr was incredibly knowledgeable and very patient. He was great at explaining things and I'd strongly recommend this course to others
Victoria Harper
Mainly the topic on creating sock puppets for gathering intelligence.