With the use of the Internet and associated technologies growing rapidly in recent years, so has the opportunity for computer related crime. Unlawful activity can be committed or facilitated online with criminals trading and sharing information, masking their identity, gathering information on victims and communicating with co-conspirators.
The course will give delegates a better understanding of both the surface and deep web, advanced searching, social media monitoring, company checks (due diligence) and 'people search' techniques.
It is designed for anyone who wishes to use the internet more effectively for research and investigation. If you are looking to gain intelligence swiftly and safely from publicly available sources on the internet then this course is for you.
What You Will Learn
This course will include face-to-face training, group participation and a live investigation and will cover:
- How to efficiently surf the web and save time getting the result you want
- Utilise the internet in a more effective way as an open source and/or investigation intelligence tool
- Protect yourself online including privacy techniques
- Understand Web 2.0 technology and the benefits/threats posed
- Collect intelligence on IP addresses, DNS and email headers
- Overview of the internet and world wide web including the methods to connect online
- Surface and invisible (deep) web searching strategies and tools
- Advanced use of internet search tools to efficiently be able to find more information in less time
- How to search for blogs, podcasts, chat rooms and other web 2.0 technology including social networks such as Facebook, LinkedIn and Twitter
- How to use specialist tools to automate a search and retrieve websites from online archives
- Understanding and using Open Source Intelligence (OSINT)
- Finding and investigating company information and profiles
- Understand criminal use of social networking sites including online gaming and currencies
- Examining geo-location data in Twitter and photos
- How to determine the owner and location of a website
- Investigating emails and examining email headers
- How to maintain security and privacy (including anonymity) when engaged in collecting evidence