-
White Shirt Pleat 1 x $19.00
-
Converse All Star 1 x $39.00
-
Nixon Porter Leather 1 x $17.00
This course will prepare the student to understand the Dark Web, adopt protective practices for accessing Dark Networks, and find the places where ongoing attack discussions are unfolding in real time. Beyond navigation, the student will learn to use relevant tools to discover and gain entry to otherwise closed sessions. In addition, students will learn how to establish private and anonymous technologies to enhance their own efforts to conduct research and investigation.
Target Audience
Security professionals who want to fill the gaps in their understanding of technical information security
Managers who want to understand information security beyond simple terminology and concepts
IT engineers and supervisors who need to know how to build a defensible network against Dark Web attacks
Administrators responsible for building and maintaining systems that are being targeted by attackers
Forensics Specialists, penetration testers, and auditors need a solid foundation of Dark Web security principles to be as effective as possible at their jobs
IT executives and management personnel involved in formulating business continuity and regulatory requirement plans for the protection of the enterprise
Prerequisites
The material is presented at an intermediate to advanced technical level while providing a cursory review of IT security and privacy fundamentals. Experience with and knowledge of security concepts, operating systems, and application systems will help you get a full understanding of the challenges that you will face as a Dark Web security professional.
Learning Outcomes
Understand the access protocols and security requirements of the Surface Web, Deep Web, and Dark Web.
Utilize the exclusive Dark Web Council Privacy and Anonymity Matrix®
Determine methods of accessing Dark Web websites utilizing TOR-based anonymity
Understand the Dark Web Council Information Discovery Framework® (IDF)
Determine the proper use of markers to generate needles and haystacks for Dark Web information analysis
Create a digital wallet and understand the use of crypto currency on the Dark Web
Create a Dark Web persona and identity to freely access anonymous websites
This course will prepare the student to understand the Dark Web, adopt protective practices for accessing Dark Networks, and find the places where ongoing attack discussions are unfolding in real time. Beyond navigation, the student will learn to use relevant tools to discover and gain entry to otherwise closed sessions. In addition, students will learn how to establish private and anonymous technologies to enhance their own efforts to conduct research and investigation.
Target Audience
Security professionals who want to fill the gaps in their understanding of technical information security
Managers who want to understand information security beyond simple terminology and concepts
IT engineers and supervisors who need to know how to build a defensible network against Dark Web attacks
Administrators responsible for building and maintaining systems that are being targeted by attackers
Forensics Specialists, penetration testers, and auditors need a solid foundation of Dark Web security principles to be as effective as possible at their jobs
IT executives and management personnel involved in formulating business continuity and regulatory requirement plans for the protection of the enterprise
Prerequisites
The material is presented at an intermediate to advanced technical level while providing a cursory review of IT security and privacy fundamentals. Experience with and knowledge of security concepts, operating systems, and application systems will help you get a full understanding of the challenges that you will face as a Dark Web security professional.
Learning Outcomes
Understand the access protocols and security requirements of the Surface Web, Deep Web, and Dark Web.
Utilize the exclusive Dark Web Council Privacy and Anonymity Matrix®
Determine methods of accessing Dark Web websites utilizing TOR-based anonymity
Understand the Dark Web Council Information Discovery Framework® (IDF)
Determine the proper use of markers to generate needles and haystacks for Dark Web information analysis
Create a digital wallet and understand the use of crypto currency on the Dark Web
Create a Dark Web persona and identity to freely access anonymous websites