Course Outline

At the end of this course you will be able to:

  • Use advanced search engine techniques and features
  • Identify websites for finding information on people and companies
  • Use deep websites and directories
  • Understand internet infrastructure and its use in intelligence gathering and investigation
  • Explain the digital footprint is left when online and the dangers associated
  • Use social media for investigation, intelligence, and geolocation
  • Describe the best open-source software to use for investigations
  • Access influential Internet communities
  • You will also have an introduction to the Dark Web, criminal innovation, and cybercrime
  • Advanced search engine techniques and Google hacking
  • How to use open-source encrypted anonymity services
  • Familiarity with the use of Tor and accessing Tor Hidden Services (THS) and other Dark Webs

Requirements

Basic understanding of computers and the internet.

 7 Hours

Number of participants



Price per participant

Testimonials (1)

Related Courses

Open Source Intelligence (OSINT) Advanced

21 Hours

Certified Information System Security Professional (CISSP) CBK Review

35 Hours

CISM - Certified Information Security Manager

28 Hours

Web Security Testing - Security and Testing of Web Applications using OWASP

21 Hours

Ethical Hacker

35 Hours

CAS for Administrators

7 Hours

Shadowsocks: Set Up a Proxy Server

7 Hours

Network Security Administrator

35 Hours

IoT Security Architecture

14 Hours

Understanding Modern Information Communication Technology

7 Hours

BeyondCorp: Implementing Zero Trust Security

14 Hours

Business Continuity Practitioner

14 Hours

Cyber Crisis & Communications Planning

7 Hours

Automotive Cyber Security Fundamentals

21 Hours

Advanced PHP and Secure Coding Course

35 Hours

Related Categories