Actions Panel
Exploiting Dark Web Intelligence
THE MOST COMPREHENSIVE COURSE ON THE DARK WEB AVAILABLE. THE FORTUNE 500 TRAIN WITH US - YOU SHOULD TOO.
When and where
Date and time
Location
Online
About this event
This is a comprehensive course presented primarily from a cybersecurity and investigative point of view and supported by real-world examples and incidents. Both the technical and non-technical alike will benefit from this course. IT and cybersecurity professionals, law enforcement, and investigators of all types will find that the skills gained will greatly enhance dark web information gathering and investigations.
What do threat actors, cybercriminals, hackers, armed forces, the CIA, FBI, EUROPOL, INTERPOL, HRVWCC, USSS, hitmen for hire, peace officers, private investigators, digital forensic analysts, cybersecurity professionals, dissidents, drug dealers, and whistleblowers have in common?
They all use the Dark Web and the anonymity it provides for one or more of these reasons:
- Protecting personal information
- Conducting investigations
- Ensuring privacy
- Conducting criminal activities
- Gathering intelligence
- Freedom of expression (or paradoxically, to censor it)
- Covert communications
With the increased popularity of the hidden services that the dark web offers and a user base that continues to grow exponentially with no end in sight, a variety of professionals now need to be dark web literate, with many needing to possess the skills necessary to safely and legally conduct investigations.
The information available on the dark web can be used to track data leaks, find out who’s been hacked and who’s going to be hacked, learn about new scams and fraudulent activity, and find out what company’s password database will soon be for sale, discover compromised military information and generally provide valuable intelligence of how criminal marketplaces are operating. These examples are the tip of the proverbial iceberg. On numerous occasions, your instructors used information gathered via dark web discussion forums to prevent identity theft and help mitigate cyber threats to organizations of all types.
TOPICS COVERED IN THE FOUR-DAY COURSE INCLUDE:
- Dark Web Backgrounder
- Cutting Through the Misinformation, Myths, and hype
- Accessing Criminal and Restricted Market Places and Forums
- Alternative Dark Networks
- Anonymizing and De-Anonymizing Technologies
- Competitive Intelligence
- Configuring and Maintaining Your Dark Web Workstation
- Content Monitoring and Alerting
- Creating and Using Sock Puppets (Dark Web Personas)
- Cryptocurrency Primer
- Dark Web Examiner Security/OPSEC
- Data Aggregation and Normalization
- Finding Exfiltrated Corporate Assets
- Messaging Technologies
- Mitigating the Effects of Data Exfiltration
- Open-Source Intelligence (OSINT) Gathering and Analysis
- OPSEC, Safety, Ethics, and Privacy Considerations
- Primary Tools and Techniques
- Searching the Dark Web
- The Asian Dark Web
- The Certified Dark Web Examiner (CDWE) ™
- Threat Hunting
- Tracing Cryptocurrency Use
- Usage Trends
- User Activity Analysis
- Using VPNs and Proxies
Copyright © 2022, CyberSecurity Academy. All Rights Reserved.
The following are trademarks of SP HAILEY ENTERPRISES LLC in the United States, other countries, or both:
- The CyberSecurity Academy Logo
- Certified Dark Web Examiner (CDWE)
- Certified Darknet Examiner (CDE)
- "CyberSecurity Academy - Learn What You're Missing"
darkweb@cybersecurityacademy.com / 855-732-2223