Cyber Crimes Research Training

It is a training that aims to use all kinds of internet open resources more effectively and efficiently in preliminary researches for cyber-attacks.

Training contents:

  • Secure Virtual Patrol and Virtualization Technologies
  • What is Proxy/VPN/Tor? How to use?
  • Deep web/Darknet
  • Social Media Tools and Social Media Reporting
  • Basic Linux and Kali Linux
  • Open-Source Research Techniques
  • Google Search Techniques
  • Social Engineering
  • Website and Email Review
  • Security and Storage of Critical Information
  • Practice and Theory Exam
Share on
Share on