Course Outline

At the end of this course you will be able to:

  • Use advanced search engine techniques and features
  • Identify websites for finding information on people and companies
  • Analyze website source code for investigative purposes
  • Use deep websites and directories
  • Understand internet infrastructure and its use intelligence gathering and investigation
  • Explain the digital footprint is left when online and the dangers associated
  • Use social media for investigation, intelligence and geolocation
  • Describe the best open source software to use for investigations
  • Access influential internet communities
  • You will also have an introduction to the Dark Web, criminal innovation and cybercrime
  • Advanced search engine techniques and Google hacking
  • How to describe the ways mobile devices can cause and opportunity and risk
  • Tracking mobile devices
  • Advanced software required for safe internet investigations
  • How to use open source encrypted anonymity services
  • Familiarity with use of Tor and accessing Tor Hidden Services (THS) and other Dark Webs
  • How Virtual currencies work, particularly Bitcoin

Requirements

Basic understanding of computers and the internet.

  7 Hours
 

Testimonials

Related Courses

Open Source Intelligence (OSINT) Advanced

  21 hours

Web Security with the OWASP Testing Framework

  28 hours

Ethical Hacker

  35 hours

CAS for Administrators

  7 hours

Shadowsocks: Set Up a Proxy Server

  7 hours

Network Security Administrator

  35 hours

NetNORAD

  7 hours

IoT Security Architecture

  14 hours

Understanding Modern Information Communication Technology

  7 hours

BeyondCorp: Implementing Zero Trust Security

  14 hours

Business Continuity Practitioner

  14 hours

Cyber Crisis & Communications Planning

  7 hours

Automotive Cyber Security Fundamentals

  21 hours

Advanced PHP and Secure Coding Course

  35 hours