Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Fundamentals of Cyber Investigations and Human Intelligence
Welcome & Introduction
Welcome & Introduction (2:14)
Pre-training Survey
Pre-training Survey
Operational Security (OPSEC)
How private is your personal information?
OPSEC Workflow (7:13)
Online Harassment
Quiz: Online Harassment
Prepare Your Investigation Workstation (2:24)
Live System Options (1:58)
Virtual Machines (5:25)
Sock Puppet Accounts (6:04)
Quiz: OPSEC
Open Source Intelligence (OSINT)
Introduction to OSINT (4:58)
The Intelligence Cycle (9:29)
OSINT Guiding Principles & Use Cases (9:56)
Basics of Information Gathering (2:53)
Google (14:52)
Bing & Yandex
Exercise: Hunt for Secrets
Email Investigations (9:38)
Username Search Essentials & Tools (7:13)
Website Investigations (1:00)
CentralOps.net (1:42)
ViewDNS.info (2:28)
Identify the technologies behind any website (0:40)
Technology Lookup with BuiltWith (1:10)
urlscan.io - The sandbox for the web (6:04)
Website Content Analysis (1:28)
Website Fingerprinting (0:57)
Quiz: OSINT
Social Media Intelligence (SOCMINT)
Introduction to SOCMINT (17:26)
Fundamental SOCMINT Techniques (27:36)
Account Profile; Content Analysis Techniques (22:56)
Identifying Relationships & Connecting Accounts (6:35)
Cold Reading: Observations VS Inferences (14:40)
From SOCMINT to HUMINT (16:50)
Active Sock Puppet Accounts (15:36)
Quiz: SOCMINT
Human Intelligence (HUMINT)
"Targeted"
Stages of a HUMINT Operation & HUMINT Techniques (18:25)
Case Study (3:33)
Covert Interviewing & Ethics (5:11)
Case Study: Minors Exploitation (9:11)
Quiz: HUMINT
Summary
Closing Remarks (2:56)
Outro (1:47)
Claim Your Student Package
Please Fill In This Form
Post-training Survey
Post-training Survey
Teach online with
Email Investigations
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock