- Duration: 3 days
- Skill-level: Foundation-level Dark Web for Intermediate skilled team members. This is not a basic class.
- Targeted Audience: This course is geared for those who wants to Understand the concept Dark Web and Dark Net to utilize it for effective cybersecurity
- Hands-on Learning: This course is approximately 50% hands-on lab to 50% lecture ratio, combining engaging lecture, demos, group activities and discussions with machine-based student labs and exercises. Student machines are required.
- Delivery Format: This course is available for onsite private classroom presentation.
- Customizable: This course may be tailored to target your specific training skills objectives, tools of choice and learning goals.
The overall world wide web is divided into three main areas – the Surface Web, the Deep Web, and the Dark Web. The Deep Web and Dark Web are the two areas which are not accessible through standard search engines or browsers. It becomes extremely important for security professionals to have control over these areas to analyze the security of your organization. This course will initially introduce you to the concept of the Deep Web and the Dark Web and their significance in the security sector. Then we will deep dive into installing operating systems and Tor Browser for privacy, security and anonymity while accessing them. During the course of the course, we will also share some best practices which will be useful in using the tools for best effect. By the end of this course, you will have hands-on experience working with the Deep Web and the Dark Web for security analysis
Working in a hands-on learning environment, led by our Dark Web expert instructor, students will learn about and explore:
- Understand the concept of Dark Net and Deep Web
- Use Tor to extract data and maintain anonymity
- Develop a security framework using Deep web evidences
Topics Covered: This is a high-level list of topics covered in this course. Please see the detailed Agenda below
- Access the Deep Web and the Dark Web
- Learn to search and find information in the Dark Web
- Protect yourself while browsing the Dark Web
- Understand what the Deep Web and Dark Web are
- Learn what information you can gather, and how
Audience & Pre-Requisites
This course is geared for attendees wants to understand the concept Dark Web and Dark Net to utilize it for effective cybersecurity
Pre-Requisites: Students should have
- Basic to Intermediate IT Skills, Microsoft azure and Machine Learning knowledge
- Good foundational mathematics or logic skills
- Basic Linux skills, including familiarity with command-line options such as ls, cd, cp, and su
Course Agenda / Topics
- Understanding the Deep and Dark Web
- The origin of the internet
- The Deep Web
- The Dark Web
- Working with the Deep Web
- Maintaining privacy on the Dark Web
- Transacting on the Dark Web
- Deep web emails – Onion Mail
- The Future of the Dark Web
- What does the future of the Deep Web hold for us?
- Dark Web markets
- The TOR Project
- Public interest in the Dark Web
- Installing a Linux Virtual Machine (VM)
- Linux Distributions
- Installing and using a Linux VM
- What else can we do with a Linux VM?
- Accessing the Dark Web with Tor Browser
- What is Tor Browser?
- Installing Tor on Linux
- Tor Project recommendations on the safe use of Tor
- Installing Tails OS
- What is Tails OS?
- Tails OS installation prerequisites
- Downloading Tails OS
- Installing Tails OS
- Installing Whonix
- What is Whonix?
- Whonix installation and prerequisites
- Using Tor Browser with Whonix
- Installing Qubes OS
- What is Qubes OS?
- Accessing the Dark Web with Qubes
- What Goes on in the Dark Web – Case Studies
- The good and evil side of the Dark Web
- Onion websites
- Illegal sales on the Dark Web using Bitcoin
- The Dangers of the Dark Web
- Online scams
- Avoiding the risks on a Dark Web market
- Dangers of the Dark Web
- Using the Dark Web for Your Business
- IT professionals
- Business companies
- Law enforcement agencies
- Military organizations
- Cybersecurity professionals