0

Your Cart is Empty

We currently have 1 seats left for this cohort. Hurry!




In this exciting and stunning course, we will show you first hand the websites and resources that are not only necessary in your investigative toolbox (but a requirement) and how to utilize them effectively and efficiently if you are going to be successful this year!

Have you ever wondered:

  • Where exactly is criminal activity happening on the net?
  • Where the fraudsters are hiding & committing their illegal acts.
  • Where you are most likely to gather the key intelligence on your person of interest.
  • What communication methods they are using the most?

You will learn:

  • Where you can find personal details on your subject
  • Where & how you can find and locate social media accounts
  • We will explore where and how you can find eCommerce, auction, and classified seller accounts
  • We will explore where the following types of criminal activity is happening (Sales of Stolen Goods (eFencing) - Insurance Fraud - Illegal Narcotics - Weapon Sales - Sales of Credit Card Details - Sales of Personal Details from Identity Theft - Child pornography & More...)
  • How to set up a cyber investigators computer, sock puppet accounts, proxies, and aliases to conduct your searches with complete anonymity

Course Benefits:

  • Access: 24/7/365 Online Unlimited Access
  • Credential Earned: Certificate of Completion
  • Availability: Desktop, Mobile, Tablet
  • CPE Credits: Included
  • Nationally Recognized Credential: NASBA, NICE,& More
  • Live Mentors: Available 9-9PM CST via Chat

Please note: To be eligible for CPE credit, you must complete the course and final exam within one year of enrollment Please be advises that you may only claim CPE credit for a course once after the certificate of completion is issued. The certificate of completion is valid for 2 years.

Curriculum

Open Source Intelligence Gathering Methodologies

  • Open Source Intelligence Gathering Methodologies
  • Resources

Exploring the Deep Web

  • DarkWeb
  • The Deep Web!
  • Introducing the TOR Project
  • Getting Started with TOR (Step by Step)
  • The Deep Web (Overview)
  • Exploration 1
  • VPN Services
  • Steps to buy and set up a VPN service to remain anonymous
  • Hidden Wiki 2017
  • Black Market Links 2017
  • Deep Web Drug Markets 2017
  • Hitman and Escrow Dark Web Links 2017
  • Directories and Lists 2017
  • TOR Wiki
  • The Secrets Behind the TOR Browser
  • What the @#$% is a Bitcoin anyway?

Closing Statements

  • Top 20 Intelligence Resources on the Net Closing Statements

Open Source Intelligence Quiz

  • Exam: Open Source Intelligence

    Industry Recognized

    McAfee-Institute-Partner-Banner