QA-QAADW

Ladda ner som PDF

Advanced Dark Web

A follow on advanced course for those delegates that have attended "The Dark Web".

With the seizure of the Silk Road in 2013; a website trading in hundreds of millions of dollars of narcotics, the world became aware of what is known as The Dark Web. An anonymous and encrypted section of the internet The Dark Web allows criminals and human rights activists alike to avoid the people hunting them. There are a number of key technologies that have allowed The Dark Web to flourish, from cryptocurrency Bitcoin to software that allows anonymity such as Tor. This advanced Dark Web course builds on the one day Dark Web course and goes into significantly more depth about how exactly the technologies work.

The intended audience is for those requiring intelligence or evidence from the Dark Web and those looking for more advanced knowledge of the theory behind the software. This will usually be those working in government or law enforcement though may also be in the private sector.

Prior knowledge

The one-day Dark Web (QADW) course is a pre-requisite for attended this Advanced Dark Web course. Introduction to Open Source Intelligence course would also be a useful prerequisite.

Objectives:

This course will allow delegates to:

  • Use and describe how Tor works in depth
  • Understand the Tor Protocol and Network
  • Describe how Tor Hidden Services (THS) are created and work, build a THS.
  • Use Tor on mobile devices, understand the leaky devices
  • Use and describe how Bitcoin works
  • Explore a number of the other Dark webs

Course Outline:

Module 1 - Tor
Understand how Tor works and install and use it. Cover the Tor protocol in depth, including Tor circuits, Director Authorities, Consensus document and Cypher Suites used.

Module 2 - Tor Hidden Services (THS)
How THS work, accessing them and how to do it safely and legally. Learn how to create a THS.

Module 3 - Tor apps
Look at Tor in other instances, including Tails, Tor Messenger and Tor on mobile devices. Discover how leaky some Tor applications can be.

Module 4 - Other Dark Webs
There are many other Dark Webs. This module will look at the alternative software used including I2P and Freenet.

Objectives:

This course will allow delegates to:

  • Use and describe how Tor works in depth
  • Understand the Tor Protocol and Network
  • Describe how Tor Hidden Services (THS) are created and work, build a THS.
  • Use Tor on mobile devices, understand the leaky devices
  • Use and describe how Bitcoin works
  • Explore a number of the other Dark webs

Course Outline:

Module 1 - Tor
Understand how Tor works and install and use it. Cover the Tor protocol in depth, including Tor circuits, Director Authorities, Consensus document and Cypher Suites used.

Module 2 - Tor Hidden Services (THS)
How THS work, accessing them and how to do it safely and legally. Learn how to create a THS.

Module 3 - Tor apps
Look at Tor in other instances, including Tails, Tor Messenger and Tor on mobile devices. Discover how leaky some Tor applications can be.

Module 4 - Other Dark Webs
There are many other Dark Webs. This module will look at the alternative software used including I2P and Freenet.

Utbildningen levereras i samarbete med

Kurs-ID: QA-QAADW
Längd: 1 dagar
Pris exkl moms: 18 000 kr

Frågor om kursen!?

Har du frågor om kursens innehåll, leveransdatum/ort eller behöver en företagsanpassad variant? Fyll i formuläret nedan!


Avtalsrabatter och kampanjer kan ej nyttjas på denna kurs.


Ort och datum

Cloud Access
i Läs mer

Delta på kursen från ditt hem, jobb eller annan plats.

14 okt
Boka nu!
21 okt
Boka nu!
19 dec
Boka nu!
13 apr
Boka nu!
17 jul
Boka nu!
16 aug
Boka nu!

Tipsa