Open Source Cyber Intelligence - Advanced
Course
Online
Description
-
Type
Course
-
Methodology
Online
This course provides delegates with Advanced knowledge in Open Source Cyber Intelligence. Building on the Introduction course this takes the gathering and finding of Open Source Cyber Intelligence to the next level with in-depth use of advanced tools that are vital for covert internet investigations and intelligence gathering. The course is highly practical allowing delegates the time to explore and understand the tools and resources covered.Target Audiencethis course is intended for anyone who wishes to be able to utilise advanced software and tools for finding intelligence gathering and investigation on the Internet and World Wide Web. It will be of particular interest to those in the private and public sector investigation or intelligence collection fields. Learning Objectives During this course delegates will learn:Advanced search engine techniques and Google hackingHow to describe the ways mobile devices can cause and opportunity and riskTracking users with GPRS and SSIDAdvanced software required for safe internet investigationsHow to use open source encrypted anonymity servicesFamiliarity with use of Tor and accessing Tor Hidden Services (THS) and other Dark WebsHow Virtual currencies work, particularly BitcoinAdvanced knowledge needed when capturing digital evidence for court
About this course
The Open Source Cyber Intelligence - Introduction is a required prerequisite for taking this course.Participants are expected to have a good knowledge of Open Source Intelligence techniques.
Reviews
Subjects
- Web
- Internet
Course programme
Module 1 - Instant Messaging - IRC
- Acronyms
- IRC Networks and Channels
Module 2 - Secure Communications
- Cryptography
- Hashing
- PGP and GnuPG
Module 3 - Cyber Threat Intelligence
- CVE
- SCAP
- TAXII, STIX and CybOX
Module 4 - Digital Evidence Capture
- Video and screenshots
- Module 5 - Intelligence Evaluation
- 5x5x5 Intelligence document
Module 6 - Background of the Dark Web
- History of Criminal Forums
- History of infamous Dark Web sites
Module 7 - Tor and Tor Hidden Servicers
- How Tor works
- How THS work
- Attacks against the Tor network
- Analysis of THS
Module 8 - Bitcoin and Cryptocurrencies
- How Bitcoin works
- Blockchain
- Proof-of-work
- Altcoins
Module 9 - Other Dark Webs
- I2p, Freenet and GNUnet
Open Source Cyber Intelligence - Advanced