This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Fundamentals of Cyber Investigations and Human Intelligence
Welcome & Introduction
Welcome & Introduction (2:14)
Pre-training Survey
Pre-training Survey
Operational Security (OPSEC)
How private is your personal information?
OPSEC Workflow (7:13)
Online Harassment
Quiz: Online Harassment
Prepare Your Investigation Workstation (2:24)
Live System Options (1:58)
Virtual Machines (5:25)
Sock Puppet Accounts (6:04)
Quiz: OPSEC
Open Source Intelligence (OSINT)
Introduction to OSINT (4:58)
The Intelligence Cycle (9:29)
OSINT Guiding Principles & Use Cases (9:56)
Basics of Information Gathering (2:53)
Google (14:52)
Bing & Yandex
Exercise: Hunt for Secrets
Email Investigations (9:38)
Username Search Essentials & Tools (7:13)
Website Investigations (1:00)
CentralOps.net (1:42)
ViewDNS.info (2:28)
Identify the technologies behind any website (0:40)
Technology Lookup with BuiltWith (1:10)
urlscan.io - The sandbox for the web (6:04)
Website Content Analysis (1:28)
Website Fingerprinting (0:57)
Quiz: OSINT
Social Media Intelligence (SOCMINT)
Introduction to SOCMINT (17:26)
Fundamental SOCMINT Techniques (27:36)
Account Profile; Content Analysis Techniques (22:56)
Identifying Relationships & Connecting Accounts (6:35)
Cold Reading: Observations VS Inferences (14:40)
From SOCMINT to HUMINT (16:50)
Active Sock Puppet Accounts (15:36)
Quiz: SOCMINT
Human Intelligence (HUMINT)
"Targeted"
Stages of a HUMINT Operation & HUMINT Techniques (18:25)
Case Study (3:33)
Covert Interviewing & Ethics (5:11)
Case Study: Minors Exploitation (9:11)
Quiz: HUMINT
Summary
Closing Remarks (2:56)
Outro (1:47)
Claim Your Student Package
Please Fill In This Form
Post-training Survey
Post-training Survey
Identifying Relationships & Connecting Accounts
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock