fbpx
course-banner.jpg

Certified Dark Web Analyst (CDWA)

The Dark Web is a vast, well-travelled, and nearly ignored waypoint of exfiltrated corporate assets as well as discussions of network attacks and methodology. Information security regularly overlooks the significance of this largely untapped resource. This course covers tools, techniques, and tactics for leveraging the Dark Web as a means for defending organizational assets proactively and reactively.

5 Days
From £1,750.00 incl. VAT

Live online events

5 days, 09:00 AM GMT - 05:00 PM GMT

Online

  • £1,750.00 incl. VAT

5 days, 09:00 AM BST - 05:00 PM BST

Online

  • £1,750.00 incl. VAT

Description

The Dark Web is a vast, well-travelled, and nearly ignored waypoint of exfiltrated corporate assets as well as discussions of network attacks and methodology. Information security regularly overlooks the significance of this largely untapped resource. This course covers tools, techniques, and tactics for leveraging the Dark Web as a means for defending organizational assets proactively and reactively.

The Dark Web consists of networking environments and infrastructure that does not leverage traditional TCP/IP technology. Appreciating these networks and adopting a successful defensive posture includes knowing what attack vectors are currently in use. Parsing nuances and critical distinctions can establish the difference between an attempted attack and a successful attack from the Dark Web.

This course will prepare the student to understand the Dark Web, adopt protective practices for accessing Dark Networks, and find the places where ongoing attack discussions are unfolding in real time. Beyond navigation, the student will learn to use relevant tools to discover and gain entry to otherwise
closed sessions. In addition, students will learn how to establish private and anonymous technologies to enhance their own efforts to conduct research and investigation. Access to the Dark Web requires specialized programs, such as TOR (The Onion Router). In depth coverage of such technology, as well as their proper installation, configuration, and use, is paramount to the proper capture of important information. Students will learn to use these tools and draw important distinctions between privacy, anonymity, and the means by which they can establish both.

Lastly, the course will explore the burgeoning area of Open Source Intelligence (OSInt) over Dark Networks and includes frameworks, techniques, and recommendations for proper analysis and synthesis of discovered information.

Audience Profile

  • Security professionals who want to fill the gaps in their understanding of technical information security
  • Managers who want to understand information security beyond simple terminology and concepts
  • IT engineers and supervisors who need to know how to build a defensible network against Dark Web attacks
  • Administrators responsible for building and maintaining systems that are being targeted by attackers
  • Forensics Specialists, penetration testers, and auditors need a solid foundation of Dark Web security principles to be as effective as possible at their jobs
  • IT executives and management personnel involved in formulating business continuity and regulatory requirement plans for the protection of the enterprise

Prerequisites

The material is presented at an intermediate to advanced technical level while providing a cursory review of IT security and privacy fundamentals. Experience with and knowledge of security concepts, operating systems, and application systems will help you get a full understanding of the challenges that you will face as a Dark Web security professional.

What's included

  • Study Guide
  • Experienced CDWA Instructor
  • Lab activities
  • Exam Voucher (Optional)
  • Certificate on Completion
  • Refreshments (Classroom training)

Course Outline

Module 1: Fundamentals of IT Security

A walkthrough of fundamental IT and risk concepts and foundations as applied to the Dark Web

Module 2:  Governance, Risk, and Compliance

An exploration of organizational concepts, risk management, and legal/regulatory concerns.

Module 3:  History of the Internet, Deep Web, and Dark Web

A historical account of modern networking and the origins and definitions of the Web

Module 4: Networking and Routing

A technical account of modern networking and the role of TOR and Dark Net infrastructure.

Module 5: Anonymity, Content, and You

A discussion and explanation of technical and organizational implications for anonymity.

Module 6: Data Discovery and Analytics on the Dark Web

A high-level framework of analysis including GRC implications and security recommendations.

Our registered and postal address is:
The Pinnacle, Office 203, 170 Midsummer Boulevard, Milton Keynes, MK9 1BP

ICSI LTD is registered in England No. 8680530