Cyber Crimes Research Training
It is a training that aims to use all kinds of internet open resources more effectively and efficiently in preliminary researches for cyber-attacks.
Training contents:
- Secure Virtual Patrol and Virtualization Technologies
- What is Proxy/VPN/Tor? How to use?
- Deep web/Darknet
- Social Media Tools and Social Media Reporting
- Basic Linux and Kali Linux
- Open-Source Research Techniques
- Google Search Techniques
- Social Engineering
- Website and Email Review
- Security and Storage of Critical Information
- Practice and Theory Exam