- Dark Networks and includes frameworks, techniques, and recommendations for proper analysis and synthesis of discovered information.
Content
DOMAIN 1: FUNDAMENTALS OF IT SECURITYA walkthrough of fundamental IT concepts and foundations
- Understand and Apply Concepts of Confidentiality, Integrity, Availability, and Anonymity
- Security Governance Principles
- Principles of Security
- Identification, Authentication, Authorization, and Accounting
- Cryptography and Asset Protection Techniques
- Distinctions between Privacy, Anonymity, and related goals
- Establishing a Private Investigation Workstation
- Principles of Virtualization and the Merits and Flaws of Various Options
- Private Browsing and Tracker/Fingerprint Mitigation
- Out-of-Band Communication Techniques
- Verification of Authenticity Regarding the Acquisition and Installation of Tools
- Concepts of Governance
- Understand Legal and Regulatory Issues that Pertain to Information Security globally
- Working with Law Enforcement (developed in conjunction with the Secret Service)
- Understand and Apply Dark Web Threat Modeling
- Forensics Investigations and the Dark Web
- Understand Business Continuity / Disaster Recovery Plans in relation to Dark Web attacks
- Understand and Implement Dark Web Professional Ethics
- Establish and Manage Security Education, Training, and Awareness of CIAA Topics
- Definitions and Terminology
- History of the Internet
- History of the Deep Web
- Understanding the Deep Web
- History of the Dark Web
- Applying the Dark Web in a modern context
- Communication Models
- Routing the Internet Protocol (IP)
- Observing Traffic Across a Network
- About TORThe Onion Router
- Other Dark Networks (e.g. I2P)
- Understanding Dark Networks
- Understanding End-To-End Encryption
- Understanding Virtual Private Networks
- Drawing Distinctions Between VPN Privacy and Dark Web Anonymity
- Principles of Cryptography, Dark Networks, and Establishing Anonymity
- Establishing and Maintaining Anonymity
- Discovering and Understanding Dark Web Content
- Establishing and Maintaining a Presence on the Dark Web
- Moving Between Surface, Deep, and Dark Web Content
- Identifying Best Practices
- Understanding and Using Cryptocurrency
- Leveraging Cryptocurrency Soft and Hard Wallets
- Exploring Dark Web Link Lists
- Exploring Dark Web Search Options
- Understanding Dark Web Markets
- Buying and Selling on the Dark Web
- Detecting and Avoiding Fraud on the Dark Web
- Leveraging Anonymous Messaging on the Dark Web
- Securely Storing Information
- Understanding Principles of OSInt
- Leveraging a Custom Information Discovery Framework
- Establishing Incident Response and Controls Introduction
- Navigating, Building, and Using Crawlers
- Integrating Dark Web into defender activities