Cursos disponibles

CSI Linux Certified Investigator

The CSI Linux Certified Investigator (CSIL-CI) is a certification focusing on the usage of CSI Linux.  This is an entry-level certification that covers the basics of using CSI Linux to do computer forensics and cyber investigations. 

Who is CI For?

  • Law Enforcement
  • Intelligence Personnel
  • Private Investigators
  • Insurance Investigators
  • Cyber Incident Responders
  • Digital Forensics (DFIR) analysts
  • Penetration Testers
  • Social Engineers
  • Recruiters
  • Human Resources Personnel
  • Researchers

Exam Format

  • Online
  • 85 questions
  • 2 hours
  • A minimum passing score of 85%

CSI Linux Certified OSINT Analyst

The CSI Linux Certified-OSINT Analyst (CSIL-COA) is an open-source intelligence and investigation certification that applies to Data Collection, Analysis, and Reporting of open source information to help provide actionable intelligence to decision-makers.

Who is C-OSINT-A For?

  • Law Enforcement
  • Intelligence Personnel
  • Private Investigators
  • Insurance Investigators
  • Cyber Incident Responders
  • Digital Forensics (DFIR) analysts
  • Penetration Testers
  • Social Engineers
  • Recruiters
  • Human Resources Personnel
  • Researchers

Domain Weights

  • OPSEC (%13)
  • Technology Basics (%20)
  • Laws, Ethics, and Investigations (%9)
  • Identification (%16)
  • Collection & Preservation (%13)
  • Examination & Analysis (%13)
  • Presentation & Reporting (%14)

Exam Format

  • Online
  • 85 questions
  • 2 hours
  • A minimum passing score of 85%

CSI Linux Certified Social Media Investigator

The CSI Linux Certified Social Media Investigator (CSIL-CSMI) is an open-source intelligence and investigation certification that applies to Data Collection, Analysis, and Reporting of open source information to help provide actionable intelligence to decision-makers.

Who is CSMI For?

  • Law Enforcement
  • Intelligence Personnel
  • Private Investigators
  • Insurance Investigators
  • Cyber Incident Responders
  • Digital Forensics (DFIR) analysts
  • Penetration Testers
  • Social Engineers
  • Recruiters
  • Human Resources Personnel
  • Researchers

Domain Weights

  • OPSEC (%13)
  • Technology Basics (%20)
  • Laws, Ethics, and Investigations (%9)
  • Identification (%16)
  • Collection & Preservation (%13)
  • Examination & Analysis (%13)
  • Presentation & Reporting (%14)

Exam Format

  • Online
  • 85 questions
  • 2 hours
  • A minimum passing score of 85%

CSI Linux Certified Dark Web Investigator

The CSI Linux Certified-Dark Web Investigator is a Dark Web Investigation certification that applies to the Data Collection, Analysis, and Reporting of Dark Web information to help provide actionable intelligence to investigators and decision-makers.

Who is C-DWI For?

  • Law Enforcement
  • Intelligence Personnel
  • Private Investigators
  • Insurance Investigators
  • Cyber Incident Responders
  • Digital Forensics (DFIR) analysts
  • Penetration Testers
  • Social Engineers
  • Recruiters
  • Human Resources Personnel
  • Researchers

Domain Weights

  • OPSEC (%13)
  • Technology Basics (%20)
  • Laws, Ethics, and Investigations (%9)
  • Identification (%16)
  • Collection & Preservation (%13)
  • Examination & Analysis (%13)
  • Presentation & Reporting (%14)

Exam Format

  • Online
  • 85 questions
  • 2 hours
  • A minimum passing score of 85%

Getting Started With CSI Linux

This course covers how to get started with CSI Linux.

What you will learn

  • Downloading and installing
    • Installing the Virtual Appliance
    • Installing onto a Bootable drive
  • Updating the system
  • Routing your traffic through Tor
    • Using the CSI TorVPN
    • Using the CSI Gateway with Whonix Virtual Machine Gateway
  • Using the Case Management System
  • and more...

General Linux Administration

This course has material that will help you learn how to navigate Linux and Bash scripting.  This will help you manage, troubleshoot, and add automation to your CSI Linux platform.

Open Source Intelligence and Investigation

CSI Linux Open Source Intelligence (OSINT) Investigation 

In this course, we will be diving into the world of online investigations and research, and how to use Open Source Intelligence (OSINT) techniques to gather valuable information. We will cover everything from the base process of investigations, to preserving online evidence, and even utilizing AI challenges. By the end of the course, you will have the skills and knowledge necessary to conduct your own online investigations.

Here is what you can expect from each section of the course:

What is OSINT?

In this section, we will define OSINT and its importance in today's world. You will learn how OSINT techniques and tools can be used to gather information that is publicly available and freely accessible.

Base Process of Investigations

We will cover the basics of investigations, including how to set up an investigation, how to preserve online evidence, and how to identify and track phone numbers and IP addresses.

Preserving Online Evidence

In this section, we will discuss how to preserve online evidence, including what to look for when collecting data and how to document your findings.

Phone Numbers and Info

We will explore the various tools and techniques that you can use to gather information about phone numbers and other personal information.

IP addresses, Proxies, and VPNs

We will discuss how to identify and track IP addresses, proxies, and VPNs, and the importance of anonymity when conducting online investigations.

DNS, Domains, and Subdomains

We will explore the various tools and techniques you can use to gather information about DNS, domains, and subdomains, and the importance of understanding this information for online investigations.

Importance of Anonymity

We will discuss the importance of anonymity when conducting online investigations and how to protect yourself while online.

Online Investigation Subjects

In this section, we will explore the various types of online investigation subjects, including misinformation, disinformation, and deception.

Setting up an Online Web Persona - Sock Puppet

We will discuss the process of setting up a fake online persona (or "sock puppet") and how it can be used in online investigations.

Using your Sock Puppet Persona to Investigate

We will explore how to use your sock puppet persona to conduct investigations, including how to interact with other users and gather information.

Language Translation Options

We will discuss the various language translation options available to you, and how they can be used to gather information from non-English sources.

Website Collection

We will cover the various tools and techniques you can use to collect information from websites, including website crawlers and web scraping tools.

3rd Party Commercial OSINT Apps

In this section, we will discuss the various 3rd-party commercial OSINT apps available to you, and how they can be used to gather information.

OSINT Frameworks (tools)

We will explore the various OSINT frameworks and tools that are available, and how they can be used to streamline your online investigation.

Tracking changes on websites

We will discuss how to track changes to websites and receive alerts when changes are made.

Public Records Searches

We will explore the various tools and techniques you can use to search public records, including online databases and archives.

Geolocation Tracking

In this section, you will learn how to use geolocation tracking to gather information about an individual or location. You’ll learn about different tools and techniques, including GPS tracking and IP tracking.

Online Investigations With Images

In this section, you will learn how to use images to gather information about an individual or location. You’ll learn about reverse image searches, facial recognition software, and more.

Social Media Sites

In this section, you will learn how to use social media sites such as Facebook, Twitter, and LinkedIn to gather information about an individual or location. You’ll learn about different techniques, including social media scraping, and how to use the information you gather.

Video Evidence Collection

In this section, you will learn how to use video evidence to gather information about an individual or location. You’ll learn about different video sources, such as security cameras, and how to use the information you gather.

Cryptocurrency

In this section, you will learn about the basics of cryptocurrency, including Bitcoin, and how it can be used in OSINT investigations. You’ll learn about different tools and techniques for tracking cryptocurrency transactions.

AI Challenges

In this section, you will learn about the challenges and opportunities posed by artificial intelligence in OSINT investigations. You’ll learn about different AI tools and techniques, including machine learning, and how to use them effectively.

Writing the Report

In this section, you will learn about the key components of a successful OSINT report. You’ll learn about different types of reports, including criminal investigations, and how to write a report that is clear, concise, and persuasive.

Case Studies

In this section, you will learn from real-life OSINT investigations. You’ll learn about different types of cases, including missing persons, and how OSINT was used to solve them.

Practicing OSINT and Resources

In this section, you will learn about different resources and tools that can help you in your OSINT investigations. You’ll also have the opportunity to practice your OSINT skills and receive feedback from your instructor.

So, are you ready to dive into the world of OSINT? Get started today and let’s start gathering information!


Social Media Intelligence and Investigation

CSI Linux SOCMINT

This course's goal is to gather information on a suspect or target using their Social Media information. Do you want to know what your competitors or enemies know about you?  These are the same techniques we use during the reconnaissance or OSINT process but focus directly on the target's Social Media presence.

The modules included are Importance of Anonymity, Base Process of Investigations, Preserving Online Evidence, Online Investigation Subjects, setting up a Sock Puppet, 3rd Party Commercial Apps, Terms of Service Challenges, tracking changes and getting alerts, Online Investigations with Images, Facebook, Twitter, Instagram, and others, Dating Sites, using your persona to investigate, Writing the Report, Case Studies, Practicing OSINT and Resources, and more

Dark Web Investigation

CSI Linux Dark Web Investigation Certification Course

You will learn about the basics of Dark Web investigations, including Dark Markets, Crypto Currency, tools to connect to Tor & I2P, and resources to help you investigate activity over Dark Web networks.   The main goal is to help gather and preserve evidence for court.

The modules in this course cover: What is the Darknet/Dark Web, Preserving Online Evidence, Base Process of Investigations, Importance of Anonymity, Connecting to Tor, Navigating the Dark Web (Tor), De-Anonymizing Tor, Other Onion Routing Dark Nets, Setting up a Dark Web Persona, What is Crypto Currency, Dark Web Investigation Subjects, Resources, Writing the Report, Case Studies, and more.

You will also be prepared to take the Certified Dark Web Investigator (CDWI) test.

Incident Response and Risk Management

This is a CSI Linux Incident Response and CompTIA Cybersecurity Analyst+ (CySA+) combined course.  In this course, you will learn everything you need to know to pass the CySA+ along with gaining key skills that will allow you to test security and identify risks.  It is suggested you use CSI Linux because there are many labs in this course.  

The CompTIA Cybersecurity Analyst+ examination is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts. The exam will certify that the successful candidate has the knowledge and skills required to configure and use threat detection tools, perform data analysis, and interpret the results to identify vulnerabilities, threats, and risks to an organization with the end goal of securing and protecting applications and systems within an organization.”

  • This course will teach you the fundamental principles of using threat and vulnerability analysis tools plus digital forensic tools 
  • Aimed at IT professionals with (or seeking) job roles such as IT Security Analyst, Security Operations Center (SOC) Analyst, Vulnerability Analyst, Cybersecurity Specialist, Threat Intelligence Analyst, and Security Engineer
Objectives
  • Identify tools and techniques to use to perform an environmental reconnaissance of a target network or security system.
  • Collect, analyze, and interpret security data from multiple log and monitoring sources.
  • Use network host and web application vulnerability assessment tools and interpret the results to provide effective mitigation.
  • Understand and remediate identity management, authentication, and access control issues.
  • Participate in a senior role within an incident response team and use forensic tools to identify the source of an attack.
  • Understand the use of frameworks, policies, and procedures and report on security architecture with recommendations for effective compensating controls
Profesor: Richard Medlin

Penetration Testing and Exploitation

Knowing how to think like the enemy is a massive advantage when trying to defend against or track them down.  This course focuses on the offensive side of security while preparing you for the CSI Linux Penetration Testing and Exploitation, EC-Council Certified Ethical Hacker (CEHv11), and CompTIA's Pentest+ certifications.  By the end of the training, you will have learned the base process of conducting a penetration test risk assessment to identify and take advantage of weaknesses and vulnerabilities.  You will also have access to a large test back to help you prepare for the three certifications listed above.

Pivoting and Tunneling Traffic

This course covers how to communicate system to system during an assessment.  One of the biggest challenges is that you found a vulnerability to exploit, but you run into a road block...  The firewall is blocking incoming connections outside the vulnerable port or you don't have a static IP address.  As ethical hackers and pen testers, we may be working out of a hotel room at night.  How can you connect to the target systems on the inside of their network?  This course explains the challenges in depth and walks through solutions to many of these common challenges.

Security+ Online Training

CompTIA Security+ is the certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management – making it an important stepping stone of an IT security career. 

CompTIA Security+ is the first security certification IT professionals should earn. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on troubleshooting to ensure security professionals have practical security problem-solving skills. Cybersecurity professionals with Security+ know how to address security incidents – not just identify them. Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.

OBJECTIVES

  • Provide operational, information, application, and infrastructure level security
  • Secure the network to maintain availability, integrity, and confidentiality of critical information
  • Operate within a set of rules, policies, and regulations wherever applicable
  • Comprehend Risk identification and mitigation

AUDIENCE

  • The series is intended for aspiring IT security professionals entering into security.
  • The professionals who are Digital Forensic Examiners, Systems Administrator, Cybersecurity Managers, Information Security Team, Junior IT Auditor/Penetration Tester.

Bash Scripting and Automation

In this course, you will learn everything you need to know to start developing basic bash scripts and do it from a security mindset.  You will also learn ideas for how to automate tasks, add error handling in shell, and Linux Linux administration.   There is an online bash emulator available in the course, but it is a LOT better if you have your own Linux system like CSI Linux to practice your coding in.

You will also get access to several eBooks that are useful for getting very good with bash.

Python Scripting

Python is a language with a simple syntax, and a powerful set of libraries. It is an interpreted language, with a rich programming environment, including a robust debugger and profiler. ... We cover data types, control flow, object-oriented programming, and security focused application development.