CSI Linux OSINT Certification
Do you want to
know what your competitors or hackers know about you? Are you investigating a suspect or potential
employee? Many of the tools, techniques,
and procedures used by the attackers can be used by those investigating as
well. This course goal is to gather
information on a suspect or target using information found on the Internet.
This course covers the following sections: Base Process of Investigations, Preserving Online Evidence, Phone Numbers and Info, IP Addresses, Proxies, and VPNs, DNS, Domains, and Subdomains, Importance of Anonymity, Online Investigation Subjects, Setting up an Online Web Persona, Using your persona to investigate, Website Collection, 3rd Party Commercial Apps, Tracking changes and getting alerts, Public Records Searches, Geolocation, Online Investigations With Images., Social Media Sites, What is Crypto Currency, OSINT Frameworks (tools), Writing the Report, Case Studies, Practicing OSINT and Resources, and more.
This course covers how to get started with CSI Linux.
What you will learn
* Downloading and installing
* Installing the Virtual Appliance
* Installing onto a Bootable drive
* Updating the system
* Routing your traffic through Tor
* Using the CSI TorVPN
* Using the CSI Gateway with Whonix Virtual Machine Gateway
* Using the Case Management System
* and more...
This course has material that will help you learn how to navigate Linux and Bash scripting. This will help you manage, troubleshoot, and add automation to your CSI Linux platform.
CSI Linux SOCMINT Certification
This course goal is to gather information on a suspect or target using their Social Media information. Do you want to know what your. These are the same techniques we use during the reconnaissance or OSINT process, but focusing directly on the target's Social Media presence.
The modules included are: Importance of Anonymity, Base Process of Investigations, Preserving Online Evidence, Online Investigation Subjects, Setting up a Sock Puppet, 3rd Party Commercial Apps, Terms Of Service Challenges, Tracking changes and getting alerts, Online Investigations With Images, Facebook, Twitter, Instagram, and others, Dating Sites, Using your persona to investigate, Writing the Report, Case Studies, Practicing OSINT and Resources, and more
CSI Linux Darkweb Investigation Certification
This course that covers the basics of Dark Web investigations including what Dark Markets are, Crypto Currency, tools to connect to Tor & I2P, and resources to help you investigate activity over Dark Web networks. The main goal is to help gather and preserve evidence for court.
The modules in this course covers: What is the Darknet/Dark Web, Preserving Online Evidence, Base Process of Investigations, Importance of Anonymity, Connecting to Tor, Navigating the Dark Web (Tor), De-Anonymizing Tor, Other Onion Routing Dark Nets, Setting up a Dark Web Persona, What is Crypto Currency, Dark Web Investigation Subjects, Resources, Writing the Report, Case Studies, and more