Close
Contact Us info@learnquest.com

??WelcomeName??
??WelcomeName??
« Important Announcement » Contact Us 877-206-0106 | USA Flag
Close
Close
Close
photo

Thank you for your interest in LearnQuest.

Your request is being processed and LearnQuest or a LearnQuest-Authorized Training Provider will be in touch with you shortly.

photo

Thank you for your interest in Private Training.

We look forward to helping you develop the perfect training solution to help you meet your company's goals.

For immediate assistance, speak with one of our representatives using the chat module below. Otherwise, LearnQuest or a LearnQuest-Authorized Training Provider will be in touch with you shortly.

Close
photo

Thank you for your interest in LearnQuest!

Now, you will be able to stay up-to-date on our latest course offerings, promotions, and training discounts. Watch your inbox for upcoming special offers.

title

Date: xxx

Location: xxx

Time: xxx

Price: xxx

Please take a moment to fill out this form. We will get back to you as soon as possible.

All fields marked with an asterisk (*) are mandatory.

Certified Dark Web Analyst Common Body of Knowledge 5th Edition

Price
3,500 USD
5
035144SE
Classroom Training, Online Training
Other

AWS Training Pass

Take advantage of flexible training options with the AWS Training Pass and get Authorized AWS Training for a full year.

Learn More

Prices reflect a 22.5% discount for IBM employees (wherever applicable).
Prices reflect a 24% discount for Kyndryl employees (wherever applicable).
Prices reflect the Accenture employee discount.
Prices shown are the special AWS Partner Prices.
Prices reflect the Capgemini employee discount.
Prices reflect the UPS employee discount.
Prices reflect the ??democompanyname?? employee discount.
GSA Private/Onsite Price: ??gsa-private-price??
For GSA pricing, please go to GSA Advantage.

Class Schedule

Delivery Formats

Sort results

Filter Classes

Guaranteed to Run

Modality

Location

Language

Date

  • Date: 27-May-2024 to 31-May-2024
    Time: 9AM - 5PM US Eastern
    Location: Virtual
    Language: English
    Delivered by: LearnQuest
    Price: 3,500 USD
  • Date: 24-Jun-2024 to 28-Jun-2024
    Time: 9AM - 5PM US Eastern
    Location: Virtual
    Language: English
    Delivered by: LearnQuest
    Price: 3,500 USD
  • Date: 22-Jul-2024 to 26-Jul-2024
    Time: 9AM - 5PM US Eastern
    Location: Virtual
    Language: English
    Delivered by: LearnQuest
    Price: 3,500 USD
  • Date: 19-Aug-2024 to 23-Aug-2024
    Time: 9AM - 5PM US Eastern
    Location: Virtual
    Language: English
    Delivered by: LearnQuest
    Price: 3,500 USD
  • Date: 16-Sep-2024 to 20-Sep-2024
    Time: 9AM - 5PM US Eastern
    Location: Virtual
    Language: English
    Delivered by: LearnQuest
    Price: 3,500 USD
  • Date: 14-Oct-2024 to 18-Oct-2024
    Time: 9AM - 5PM US Eastern
    Location: Virtual
    Language: English
    Delivered by: LearnQuest
    Price: 3,500 USD
  • Date: 11-Nov-2024 to 15-Nov-2024
    Time: 9AM - 5PM US Eastern
    Location: Virtual
    Language: English
    Delivered by: LearnQuest
    Price: 3,500 USD
  • Date: 9-Dec-2024 to 13-Dec-2024
    Time: 9AM - 5PM US Eastern
    Location: Virtual
    Language: English
    Delivered by: LearnQuest
    Price: 3,500 USD
  • Date: 6-Jan-2025 to 10-Jan-2025
    Time: 9AM - 5PM US Eastern
    Location: Virtual
    Language: English
    Delivered by: LearnQuest
    Price: 3,500 USD
View Global Schedule

Course Description

Overview

The Dark Web is a vast, well-traveled, and nearly ignored waypoint of exfiltrated corporate assets as well as discussions of network attacks and methodology. Information security regularly overlooks the significance of this largely untapped resource. This course covers tools, techniques, and tactics for leveraging the Dark Web as a means for defending organizational assets proactively and reactively. The Dark Web consists of networking environments and infrastructure that does not leverage traditional TCP/IP technology. Appreciating these networks and adopting a successful defensive posture includes knowing what attack vectors are currently in use. Parsing nuances and critical distinctions can establish the difference between an
attempted attack and a successful attack from the Dark Web. This course will prepare the student to understand the Dark Web, adopt protective practices for accessing Dark Networks, and find the places where ongoing attack discussions are unfolding in real time. Beyond navigation, the student will learn to use relevant tools to discover and gain entry to otherwise closed sessions. In addition, students will learn how to establish private and anonymous technologies to enhance their own efforts to conduct research and investigation. Access to the
Dark Web requires specialized programs, such as TOR (The Onion Router). In depth coverage of such technology, as well as their proper installation, configuration, and use, is paramount to the proper capture of important information. Students will learn to use these tools and draw important distinctions between privacy, anonymity, and the means by which they can establish both. Lastly, the course will explore the burgeoning area of Open Source Intelligence (OSInt)
  • Dark Networks and includes frameworks, techniques, and recommendations for proper analysis and synthesis of discovered information.

Objectives

Upon completion of the Certified Dark Web Analyst Common Body of Knowledge 5th Edition course, students will be able to:
  • Learn the origin and motives beyond Dark Network creation and evolution
  • Relate Dark Web marketplaces and exfiltrated corporate assets
  • Relate Dark Web content to your organization’s effort to secure assets
  • Learn to find content on the Dark Web given the lack of conventional search
  • Leverage anonymizing technologies to enhance investigative efforts
  • Capitalize on the distinctions between privacy and anonymity
  • Explore technologies that provide or enhance privacy and anonymity
  • Create an anonymous Dark Web persona
  • Conduct investigations with anonymous messaging and network access
  • Gain entry to otherwise restricted forums and markets
  • Learn how cryptocurrencies and exploring alternatives beyond Bitcoin
  • Learn how cryptocurrencies can be traceable and which ones afford greater anonymity
  • Establish methods for collecting and storing data securely
  • Learn how and why work with Law Enforcement can facilitate investigation
  • Learn how to configure a private and anonymous workstation
  • Learn about alternative messaging technologies such as Bitmessage
  • Learn about alternative Dark Networks such as I2P (Invisible Internet Project)
  • Learn how to find exfiltrated data on the Dark Web
  • Analyze data on the Dark Web and answering questions such as: How did data get on the Dark Web? ; How can we minimize the effects of that data exfiltration? ; How can we enhance our abilities to detect/prevent future exfiltration?
  • Make use of the Dark Web response as part of Incident Management
  • Make Dark Web a source for research regarding competitors and subjects of interest

Audience

  • Any information security professional, including the CISO, Red Team, and Business Analyst,Network Security Administrator, and Risk Management Professional, can substantially benefit from an enhanced appreciate for private and anonymous technologies. This course is primarily designed for information security professionals who are tasked with conducting investigations and defending organizational assets. This training will augment the expertise of Penetration
Testers exploring new avenues of potential exploit. In addition, business analysts can benefit by exploring additional sources of information regarding threats to organizational assets. Risk management professionals can glean information about current threats to organizational assets. Network administrations will better be able to determine whether such technologies are being used on corporate networks without authorization. CISOs will be able to better establish policy regarding the safe habits of employees and interactions with customers. Further, privacy enthusiasts, concerned with their ability to establish and maintain safer online habits, will learn valuable techniques and concepts necessary to operate over private connections and Dark Networks.
  • This class is not designed for those looking to abuse the Dark Web in furtherance of any illegal or unethical activities. Students are required to learn about their ethical obligations and sign a statement that their use of any tools, techniques or processes taught in this course will be for lawful purposes exclusively.

Prerequisites

    This course is entry level for Cyber Security professionals. As such, a general knowledge of the following is recommended:
    • Basic networking skills
    • Knowledge of remedial risk management technologies and concepts
    • Basic navigation of Windows and program installation
    • Fundamental usage of website browsing

Topics

DOMAIN 1: FUNDAMENTALS OF IT SECURITY A walkthrough of fundamental IT concepts and foundations
  • Understand and Apply Concepts of Confidentiality, Integrity, Availability, and Anonymity
  • Security Governance Principles
  • Principles of Security
  • Identification, Authentication, Authorization, and Accounting
  • Cryptography and Asset Protection Techniques
  • Distinctions between Privacy, Anonymity, and related goals
  • Establishing a Private Investigation Workstation
  • Principles of Virtualization and the Merits and Flaws of Various Options
  • Private Browsing and Tracker/Fingerprint Mitigation
  • Out-of-Band Communication Techniques
  • Verification of Authenticity Regarding the Acquisition and Installation of Tools
DOMAIN 2: GOVERNANCE, RISK, AND COMPLIANCE An exploration of organizational concepts, risk management, and legal/regulatory concerns.
  • Concepts of Governance
  • Understand Legal and Regulatory Issues that Pertain to Information Security globally
  • Working with Law Enforcement (developed in conjunction with the Secret Service)
  • Understand and Apply Dark Web Threat Modeling
  • Forensics Investigations and the Dark Web
  • Understand Business Continuity / Disaster Recovery Plans in relation to Dark Web attacks
  • Understand and Implement Dark Web Professional Ethics
  • Establish and Manage Security Education, Training, and Awareness of CIAA Topics
DOMAIN 3 - HISTORY OF THE INTERNET, DEEP WEB AND DARK WEB A historical account of modern networking and the origins and definitions of the Web
  • Definitions and Terminology
  • History of the Internet
  • History of the Deep Web
  • Understanding the Deep Web
  • History of the Dark Web
  • Applying the Dark Web in a modern context
DOMAIN 4 - NETWORKING AND ROUTING ON THE DARK WEB A technical account of modern networking and the role of TOR and Dark Net infrastructure.
  • Communication Models
  • Routing the Internet Protocol (IP)
  • Observing Traffic Across a Network
  • About TOR—The Onion Router
  • Other Dark Networks (e.g. I2P)
  • Understanding Dark Networks
  • Understanding End-To-End Encryption
  • Understanding Virtual Private Networks
  • Drawing Distinctions Between VPN Privacy and Dark Web Anonymity
  • Principles of Cryptography, Dark Networks, and Establishing Anonymity
DOMAIN 5 - ANONYMITY, THE DARK WEB, AND YOU A discussion and explanation of technical and organizational implications for anonymity.
  • Establishing and Maintaining Anonymity
  • Discovering and Understanding Dark Web Content
  • Establishing and Maintaining a Presence on the Dark Web
  • Moving Between Surface, Deep, and Dark Web Content
  • Identifying Best Practices
  • Understanding and Using Cryptocurrency
  • Leveraging Cryptocurrency Soft and Hard Wallets
  • Exploring Dark Web Link Lists
  • Exploring Dark Web Search Options
  • Understanding Dark Web Markets
  • Buying and Selling on the Dark Web
  • Detecting and Avoiding Fraud on the Dark Web
  • Leveraging Anonymous Messaging on the Dark Web
  • Securely Storing Information
DOMAIN 6 - CRAWLERS AND DATA DISCOVERY IN THE DARK WEB A high-level framework of analysis including GRC implications and praxis.
  • Understanding Principles of OSInt
  • Leveraging a Custom Information Discovery Framework
  • Establishing Incident Response and Controls Introduction
  • Navigating, Building, and Using Crawlers
  • Integrating Dark Web into defender activities
2023 Top 20 Training Industry Company - IT Training

Need Help?

Call us at 877-206-0106 or e-mail us at info@learnquest.com

Personalized Solutions

Need a personalized solution for your Training? Contact us, and one of our training advisors will help you find the best solution.

Contact Us

Need Help?

Do you have a question about the courses, instruction, or materials covered? Do you need help finding which course is best for you? We are here to help!

Talk to us

20% Off All AI Training Courses

Achieve more with AI-powered tools and strategies.

PROMO CODE: AI20
VALID THROUGH APRIL 30, 2024

20% Off All AI Training Courses

Self-Paced Training Info

Learn at your own pace with anytime, anywhere training

  • Same in-demand topics as instructor-led public and private classes.
  • Standalone learning or supplemental reinforcement.
  • e-Learning content varies by course and technology.
  • View the Self-Paced version of this outline and what is included in the SPVC course.
  • Learn more about e-Learning

Course Added To Shopping Cart

bla

bla

bla

bla

bla

bla

Self-Paced Training Terms & Conditions

??spvc-wbt-warning??
??group-training-form-area??
??how-can-we-help-you-area??
??personalized-form-area??
??request-quote-area??

Sorry, there are no classes that meet your criteria.

Please contact us to schedule a class.
Close

self-paced
STOP! Before You Leave

Save 0% on this course!

Take advantage of our online-only offer & save 0% on any course !

Promo Code skip0 will be applied to your registration

Close
Nothing yet
here's the message from the cart

To view the cart, you can click "View Cart" on the right side of the heading on each page
Add to cart clicker.

Purchase Information

??elearning-coursenumber?? ??coursename??
View Cart

Need more Information?

Speak with our training specialists to continue your learning journey.

 

Delivery Formats

Close

By submitting this form, I agree to LearnQuest's Terms and Conditions

heres the new schedule
This website uses third-party profiling cookies to provide services in line with the preferences you reveal while browsing the Website. By continuing to browse this Website, you consent to the use of these cookies. If you wish to object such processing, please read the instructions described in our Privacy Policy.
Your use of this LearnQuest site affirms your consent to our use of session and persistent cookies to track how you use our website.