The Dark Web Training Course
This course is designed for professionals who require intelligence or evidence from the Dark Web. Participants typically come from government or law enforcement backgrounds, though private sector practitioners may also benefit from the content.
This course is available as onsite live training in Malaysia or online live training.Course Outline
- Grasp the distinctions between the Clear Web and the Deep Web
- Identify the essential precautions required when navigating the Deep Web
- Learn to install and configure a Linux distribution
- Master techniques to fully anonymize your identity and browsing activities
- Explore methods for indexing and searching for websites on the Deep Web
- Gain insights into Bitcoin and PGP encryption
- Clarify common misconceptions and myths surrounding the Deep Web
Requirements
A fundamental understanding of computers and internet operations.
Open Training Courses require 5+ participants.
The Dark Web Training Course - Booking
The Dark Web Training Course - Enquiry
The Dark Web - Consultancy Enquiry
Testimonials (3)
Experience sharing, it's teacher's know-how and valuable.
Carey Fan - Logitech
Course - C/C++ Secure Coding
get to understand more about the product and some key differences between RHDS and open source OpenLDAP.
Jackie Xie - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
the knowledge of the trainer was very high - he knew what he was talking about, and knew the answers to our questions
Adam - Fireup.PRO
Course - Advanced Java Security
Upcoming Courses
Related Courses
389 Directory Server for Administrators
14 HoursThis instructor-led, live training in Malaysia (online or onsite) is designed for system administrators who wish to use 389 Directory Server to configure and manage LDAP-based authentication and authorisation.
Upon completing this training, participants will be able to:
- Install and configure 389 Directory Server.
- Understand the features and architecture of 389 Directory Server.
- Learn how to configure the directory server using the web console and CLI.
- Set up and monitor replication for high availability and load balancing.
- Manage LDAP authentication using SSSD for faster performance.
- Integrate 389 Directory Server with Microsoft Active Directory.
Active Directory for Admins
21 HoursThis instructor-led, live training in Malaysia (online or onsite) is designed for system administrators who want to use Microsoft Active Directory to manage and secure data access.
By the end of this training, participants will be able to:
- Set up and configure Active Directory.
- Create a domain and define access rights for users and devices.
- Manage users and machines through Group Policies.
- Control access to file servers.
- Set up a Certificate Service and manage certificates.
- Implement and manage services such as encryption, certificates, and authentication.
Android Security
14 HoursAndroid serves as an open-source platform for mobile devices, including smartphones and tablets. It offers a wide array of security features designed to facilitate the development of secure software. Nevertheless, it lacks certain security elements found on other mobile platforms. This course provides a thorough examination of these features and highlights critical gaps associated with the underlying Linux system, file structure, and general environment, as well as issues related to permission management and other Android development components.
The course details common security pitfalls and vulnerabilities for both native code and Java applications, offering recommendations and best practices to prevent and mitigate these risks. Many of the discussed issues are illustrated with real-world examples and case studies. Additionally, the course covers how to utilise security testing tools to identify potential programming flaws related to security.
Participants attending this course will
- Gain a solid understanding of fundamental security principles, IT security, and secure coding techniques
- Learn about the security solutions available on Android
- Master the use of various Android platform security features
- Receive updates on recent Java vulnerabilities within the Android environment
- Identify common coding errors and learn how to avoid them
- Understand vulnerabilities associated with native code on Android
- Recognise the serious implications of insecure buffer handling in native code
- Comprehend architectural protection mechanisms and their limitations
- Access resources and further reading on secure coding practices
Audience
Professionals
Network Security and Secure Communication
21 HoursDeveloping secure networked applications can be challenging, even for developers who have previously utilized various cryptographic building blocks, such as encryption and digital signatures. To help participants grasp the role and application of these cryptographic primitives, the course begins by establishing a solid foundation regarding the core requirements of secure communication: secure acknowledgement, integrity, confidentiality, remote identification, and anonymity. It also addresses typical threats that may compromise these requirements, alongside real-world solutions.
As cryptography is a critical aspect of network security, the course covers the most important algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement. Rather than focusing on complex mathematical theory, these topics are presented from a developer's perspective, illustrating typical use-case examples and practical considerations, such as the implementation of public key infrastructures. Additionally, security protocols used in various areas of secure communication are introduced, with an in-depth discussion on widely-used protocol families like IPSEC and SSL/TLS.
Common cryptographic vulnerabilities are examined, covering issues related to specific algorithms and protocols such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE, and RSA timing attacks. For each problem, practical considerations and potential consequences are described without delving into deep mathematical details.
Finally, since XML technology is central to data exchange for networked applications, the security aspects of XML are detailed. This includes the use of XML in web services and SOAP messages, along with protection mechanisms like XML Signature and XML Encryption. The course also covers weaknesses in these protection measures and XML-specific security issues such as XML injection, XML External Entity (XXE) attacks, XML bombs, and XPath injection.
Participants attending this course will
- Understand basic concepts of security, IT security, and secure coding
- Grasp the requirements of secure communication
- Learn about network attacks and defenses across different OSI layers
- Develop a practical understanding of cryptography
- Understand essential security protocols
- Comprehend recent attacks against cryptosystems
- Gain information on recent related vulnerabilities
- Understand security concepts of Web services
- Access sources and further readings on secure coding practices
Audience
Developers, Professionals
C/C++ Secure Coding
21 HoursSpanning three days, this course explores the foundational principles of securing C/C++ code. Participants will learn how to protect against malicious exploitation of common vulnerabilities, particularly those arising from memory management and input handling.
Advanced Java Security
21 HoursEven seasoned Java developers often do not fully master the array of security services provided by Java, nor are they always aware of the distinct vulnerabilities that affect web applications built with Java.
This course not only introduces the security components of the Standard Java Edition but also addresses security challenges within the Java Enterprise Edition (JEE) and web services. The discussion of specific services begins with the fundamental principles of cryptography and secure communication. A series of practical exercises covers both declarative and programmatic security techniques in JEE, while the course explores transport-layer and end-to-end security for web services. Participants will engage in several hands-on exercises to apply and experiment with the discussed APIs and tools.
The course also examines and clarifies the most common and severe programming flaws associated with the Java language and platform, along with web-related vulnerabilities. Beyond typical bugs made by Java programmers, the security vulnerabilities covered include issues specific to the language and those arising from the runtime environment. Each vulnerability and its corresponding attack vector are demonstrated through clear, easy-to-follow exercises, followed by recommended coding guidelines and potential mitigation strategies.
Participants attending this course will
- Grasp the fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and understand how to prevent them
- Understand the security principles underlying web services
- Acquire the skills to utilise various security features within the Java development environment
- Develop a practical understanding of cryptography
- Comprehend the security solutions provided by Java EE
- Learn to identify typical coding mistakes and how to avoid them
- Gain insights into some recent vulnerabilities within the Java framework
- Obtain practical experience in using security testing tools
- Access resources and further reading materials on secure coding practices
Audience
Developers
Standard Java Security
14 HoursDescription
While the Java language and its Runtime Environment (JRE) were engineered to eliminate many of the common security vulnerabilities found in languages such as C and C++, it remains crucial for software developers and architects to possess a dual understanding. This includes mastery of the Java environment's positive security features, as well as awareness of the negative security aspects—specifically, the vulnerabilities that still impact Java development.
Before introducing security services, the course provides a concise overview of cryptography fundamentals, establishing a shared baseline for understanding the purpose and functionality of the relevant components. Participants apply this knowledge through practical exercises, allowing them to experiment with the discussed APIs firsthand.
Furthermore, the course examines and elucidates the most frequent and severe programming flaws within the Java language and platform. It addresses both typical errors made by Java programmers and issues specific to the language and its environment. Each vulnerability and its corresponding attack vector are demonstrated via accessible exercises, followed by recommended coding guidelines and mitigation strategies.
Participants attending this course will
- Grasp the fundamental concepts of security, IT security, and secure coding
- Identify web vulnerabilities beyond the OWASP Top Ten and learn how to prevent them
- Utilise various security features within the Java development environment
- Develop a practical understanding of cryptography
- Recognise common coding mistakes and learn how to avoid them
- Gain insights into recent vulnerabilities affecting the Java framework
- Access resources and further reading on secure coding practices
Audience
Developers
.NET, C# and ASP.NET Security Development
14 HoursToday, a variety of programming languages enable code compilation for the .NET and ASP.NET frameworks. While these environments offer robust security development capabilities, developers must understand how to apply architecture-level and coding-level techniques to implement desired security functions effectively, prevent vulnerabilities, and mitigate potential exploitation.
This course aims to equip developers with practical skills through extensive hands-on exercises. Participants will learn how to prevent untrusted code from executing privileged actions, protect resources via strong authentication and authorization, manage remote procedure calls and sessions, and explore various functional implementations, among other key topics.
The introduction to different vulnerabilities begins by examining typical programming issues associated with .NET, while the discussion on ASP.NET vulnerabilities covers various environment settings and their impacts. Furthermore, the module on ASP.NET-specific vulnerabilities addresses general web application security challenges alongside special issues and attack methods, such as ViewState attacks and string termination attacks.
Participants attending this course will
- Grasp the fundamental concepts of security, IT security, and secure coding practices
- Gain knowledge of web vulnerabilities beyond the OWASP Top Ten and learn how to avoid them
- Learn to utilise various security features within the .NET development environment
- Acquire practical experience using security testing tools
- Understand common coding mistakes and discover how to prevent them
- Receive information on recent vulnerabilities affecting .NET and ASP.NET
- Access resources and further reading materials on secure coding practices
Audience
Developers
The Secure Coding Landscape
14 HoursThis course provides an introduction to fundamental security principles, offering a broad perspective on vulnerability types across different programming languages and platforms. It outlines strategies for managing software security risks throughout all stages of the software development lifecycle. While avoiding deep technical complexities, the course highlights prominent and impactful vulnerabilities prevalent in modern software development technologies. It also addresses the challenges of security testing and introduces practical techniques and tools to help participants identify and resolve existing issues in their code.
Upon completion of this course, participants will
- Grasp the core concepts of security, IT security, and secure coding practices
- Comprehend web vulnerabilities affecting both server and client sides
- Recognize the serious implications of improper buffer handling
- Gain awareness of recent vulnerabilities found in development environments and frameworks
- Learn about common coding errors and methods to prevent them
- Understand various security testing approaches and methodologies
Intended Audience
Managers
FreeIPA for Administrators
14 HoursThis instructor-led live training in Malaysia (online or onsite) is designed for system administrators who wish to use FreeIPA to centralise authentication, authorisation, and account information for their organisation’s users, groups, and machines.
By the end of this training, participants will be able to:
- Install and configure FreeIPA.
- Manage Linux users and clients from a single central location.
- Use FreeIPA's CLI, Web UI and RPC interface to set up and manage permissions.
- Enable Single Sign On authentication across all systems, services and applications.
- Integrate FreeIPA with Windows Active Directory.
- Backup, replicate and migrate an FreeIPA server.
Identity and Access Management with Okta
14 HoursThis instructor-led, live training in Malaysia (online or onsite) is tailored for system administrators who wish to utilise Okta for identity and access management.
By the end of this training, participants will be able to:
- Configure, integrate, and manage Okta.
- Integrate Okta into existing applications.
- Implement security using multi-factor authentication.
OpenLDAP Workshop
21 HoursThis instructor-led, live training in Malaysia (online or onsite) is aimed at intermediate-level system administrators and IT professionals who wish to install, configure, manage, and secure LDAP directories using OpenLDAP.
By the end of this training, participants will be able to:
- Understand the structure and operation of LDAP directories.
- Install and configure OpenLDAP for various deployment environments.
- Implement access control, authentication, and replication mechanisms.
- Use OpenLDAP with third-party services and applications.
Identity and Access Management using OpenAM
14 HoursThis instructor-led, live training in Malaysia (online or onsite) is designed for system administrators who wish to use OpenAM to manage identity and access controls for web applications.
By the end of this training, participants will be able to:
- Set up the necessary server environment to begin configuring authentication and access controls using OpenAM.
- Implement single sign-on (SSO), multi-factor authentication (MFA), and user self-service features for web applications.
- Utilise federation services (OAuth 2.0, OpenID, SAML v2.0, etc.) to extend identity management securely across different systems or applications.
- Access and manage authentication, authorisation, and identity services through REST APIs.
OpenDJ for Administrators
14 HoursThis instructor-led, live training in Malaysia (online or onsite) targets system administrators aiming to use OpenDJ for managing organizational user credentials in a production environment.
Upon completion of this training, participants will be able to:
- Install and configure OpenDJ.
- Maintain an OpenDJ server, including monitoring, troubleshooting, and optimizing for performance.
- Create and manage multiple OpenDJ databases.
- Backup and migrate an OpenDJ server.