Open Source Cyber Intelligence - Advanced

2 Day Course
Hands On
Code QAOSCIA

This course has been retired. Please view currently available Cyber Security Training Courses.

Modules

Collapse all

Instant Messaging - IRC (2 topics)

  • Acronyms
  • IRC Networks and Channels

Secure Communications (3 topics)

  • Cryptography
  • Hashing
  • PGP and GnuPG

Cyber Threat Intelligence (3 topics)

  • CVE
  • SCAP
  • TAXII, STIX and CybOX

Digital Evidence Capture (1 topic)

  • Video and screenshots

Intelligence Evaluation (1 topic)

  • 5x5x5 Intelligence document

Background of the Dark Web (2 topics)

  • History of Criminal Forums
  • History of infamous Dark Web sites

Tor and Tor Hidden Servicers (4 topics)

  • How Tor works
  • How THS work
  • Attacks against the Tor network
  • Analysis of THS

Bitcoin and Cryptocurrencies (4 topics)

  • How Bitcoin works
  • Blockchain
  • Proof-of-work
  • Altcoins

Other Dark Webs (1 topic)

  • I2p, Freenet and GNUnet

Prerequisites

The Open Source Cyber Intelligence - Introduction is a required prerequisite for taking this course.

Participants are expected to have a good knowledge of Open Source Intelligence techniques.

Course PDF

Print

Sections