The Dark Web Training Course
This course is designed for individuals who need to gather intelligence or evidence from the Dark Web. Participants typically come from government or law enforcement backgrounds, but it may also be suitable for those in the private sector.
This course is available as onsite live training in South Korea or online live training.Course Outline
- Differentiate between the Clear Web and the Deep Web
- Identify the necessary precautions for browsing the Deep Web safely
- Learn how to install and configure a Linux distribution
- Master techniques to fully anonymize your identity and browsing activities
- Discover methods to index and search for websites on the Deep Web
- Gain knowledge about Bitcoin and PGP
- Clarify common misconceptions and myths surrounding the Deep Web
Requirements
A basic understanding of computers and the internet is required.
Open Training Courses require 5+ participants.
The Dark Web Training Course - Booking
The Dark Web Training Course - Enquiry
The Dark Web - Consultancy Enquiry
Testimonials (3)
Experience sharing, it's teacher's know-how and valuable.
Carey Fan - Logitech
Course - C/C++ Secure Coding
get to understand more about the product and some key differences between RHDS and open source OpenLDAP.
Jackie Xie - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
the knowledge of the trainer was very high - he knew what he was talking about, and knew the answers to our questions
Adam - Fireup.PRO
Course - Advanced Java Security
Upcoming Courses
Related Courses
389 Directory Server for Administrators
14 HoursThis instructor-led, live training in South Korea (online or onsite) is designed for system administrators who want to use 389 Directory Server to configure and manage LDAP-based authentication and authorization.
Upon completion of this training, participants will be able to:
- Install and configure 389 Directory Server.
- Understand the features and architecture of 389 Directory Server.
- Learn how to configure the directory server using the web console and CLI.
- Set up and monitor replication for high availability and load balancing.
- Manage LDAP authentication using SSSD for faster performance.
- Integrate 389 Directory Server with Microsoft Active Directory.
Active Directory for Admins
21 HoursThis instructor-led live training in South Korea (online or onsite) targets system administrators who want to utilize Microsoft Active Directory to manage and secure data access.
By the conclusion of this training, participants will be able to:
- Deploy and configure Active Directory.
- Establish domains and define access permissions for users and devices.
- Administer users and machines via Group Policies.
- Regulate access to file servers.
- Configure Certificate Services and oversee certificate management.
- Deploy and manage services including encryption, certificates, and authentication.
Android Security
14 HoursAndroid serves as an open platform for mobile devices, including smartphones and tablets. It offers a wide array of security features designed to simplify the development of secure software; however, it lacks certain security aspects found in other mobile platforms. This course provides a comprehensive overview of these features while highlighting critical shortcomings related to the underlying Linux environment, file system, and general setup, as well as issues concerning permissions and other Android development components.
The curriculum details common security pitfalls and vulnerabilities in both native code and Java applications, along with recommendations and best practices for avoiding and mitigating them. Many discussed issues are illustrated with real-life examples and case studies. Additionally, the course offers a brief overview of how to utilize security testing tools to uncover security-related programming bugs.
Participants attending this course will
- Understand fundamental concepts of security, IT security, and secure coding
- Learn about security solutions within Android
- Gain proficiency in using various security features of the Android platform
- Obtain information on recent Java vulnerabilities specific to Android
- Learn about common coding mistakes and strategies to avoid them
- Gain insights into native code vulnerabilities on Android
- Recognize the severe consequences of insecure buffer handling in native code
- Understand architectural protection techniques and their limitations
- Access resources and further readings on secure coding practices
Audience
Professionals
Network Security and Secure Communication
21 HoursBuilding a secure networked application can be challenging, even for developers who have previously utilized various cryptographic components like encryption and digital signatures. To help participants grasp the role and application of these cryptographic primitives, the course first establishes a strong foundation on the core requirements of secure communication—including secure acknowledgment, integrity, confidentiality, remote authentication, and anonymity. It also outlines common threats that can compromise these requirements alongside real-world mitigation strategies.
Given that cryptography is a critical component of network security, the course examines essential cryptographic algorithms, including symmetric cryptography, hashing, asymmetric cryptography, and key agreement protocols. Rather than focusing on complex mathematical theories, the material is presented from a developer's perspective, featuring typical use-case examples and practical considerations such as public key infrastructure (PKI). Additionally, security protocols across various domains of secure communication are introduced, with a detailed examination of widely adopted protocol families like IPSEC and SSL/TLS.
The course addresses common cryptographic vulnerabilities associated with specific algorithms and protocols, such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE, and RSA timing attacks. For each issue, practical implications and potential consequences are explained without delving into deep mathematical details.
Finally, since XML technology is central to data exchange in networked applications, the course covers XML security aspects. This includes the use of XML in web services and SOAP messages, protection mechanisms like XML Signature and XML Encryption, and potential weaknesses in these measures. XML-specific security issues such as XML injection, XML external entity (XXE) attacks, XML bombs, and XPath injection are also discussed.
Participants attending this course will
- Understand basic concepts of security, IT security, and secure coding
- Comprehend the requirements for secure communication
- Learn about network attacks and defenses across different OSI layers
- Gain practical knowledge of cryptography
- Understand essential security protocols
- Recognize recent attacks targeting cryptosystems
- Gain insights into recent related vulnerabilities
- Understand security concepts within web services
- Access resources and further reading materials on secure coding practices
Audience
Developers, Professionals
C/C++ Secure Coding
21 HoursThis three-day course provides foundational knowledge on securing C/C++ code against potential exploitation by malicious actors, focusing on vulnerabilities related to memory management and input handling. It emphasizes the core principles necessary for writing robust and secure software.
Advanced Java Security
21 HoursEven seasoned Java developers often do not fully master the range of security services provided by Java, nor are they always aware of the vulnerabilities that impact web applications built with Java.
This course introduces the security components of the Java Standard Edition (JSE) and addresses security issues related to the Java Enterprise Edition (JEE) and web services. Discussions of specific services begin with the fundamentals of cryptography and secure communication. Through a series of exercises, learners explore both declarative and programmatic security techniques in JEE, alongside transport-layer and end-to-end security for web services. Participants gain hands-on experience with the discussed APIs and tools through practical exercises.
The course also covers the most common and severe programming flaws in the Java language and platform, as well as web-related vulnerabilities. Beyond typical bugs, the security vulnerabilities explored include both language-specific issues and problems arising from the runtime environment. Each vulnerability and its corresponding attack is demonstrated through easy-to-understand exercises, followed by recommended coding guidelines and mitigation strategies.
Participants attending this course will
- Understand basic concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and how to avoid them
- Understand the security concepts of web services
- Learn to use various security features of the Java development environment
- Gain a practical understanding of cryptography
- Understand Java EE security solutions
- Learn about typical coding mistakes and how to avoid them
- Receive information about recent vulnerabilities in the Java framework
- Acquire practical knowledge in using security testing tools
- Access resources and further reading on secure coding practices
Audience
Developers
Standard Java Security
14 HoursDescription
The Java language and the Java Runtime Environment (JRE) were engineered to eliminate many of the critical security vulnerabilities commonly found in languages such as C/C++. However, software developers and architects must not only master the positive security features available within the Java ecosystem but also remain vigilant about the persistent negative security risks inherent to Java development.
To set a solid foundation for understanding the purpose and mechanics of these security components, the course begins with an overview of cryptography fundamentals. Participants then engage in hands-on practical exercises to explore and utilize the relevant APIs firsthand.
Additionally, the curriculum thoroughly examines the most frequent and severe programming flaws specific to the Java language and platform. This includes typical errors made by Java developers as well as issues unique to the language and its environment. All identified vulnerabilities and their corresponding attack vectors are illustrated through clear, easy-to-understand exercises, followed by recommended coding guidelines and effective mitigation strategies.
Participants attending this course will
- Grasp core concepts of security, IT security, and secure coding
- Discover web vulnerabilities beyond the OWASP Top Ten and learn how to prevent them
- Gain proficiency in utilizing various security features of the Java development environment
- Develop a practical understanding of cryptography
- Identify common coding mistakes and learn strategies to avoid them
- Stay informed about recent vulnerabilities within the Java framework
- Access resources and further readings on secure coding best practices
Audience
Developers
.NET, C# and ASP.NET Security Development
14 HoursToday, a variety of programming languages allow code to be compiled for the .NET and ASP.NET frameworks. While these environments offer robust security development capabilities, developers must understand how to apply architecture- and code-level techniques to implement desired security features, prevent vulnerabilities, and limit potential exploitation.
This course aims to equip developers with the skills to prevent untrusted code from executing privileged actions, protect resources via strong authentication and authorization, manage remote procedure calls and sessions, and explore diverse implementation strategies for various functionalities through numerous hands-on exercises.
The course introduces various vulnerabilities by first examining typical programming pitfalls associated with .NET. It then discusses ASP.NET vulnerabilities, analyzing how different environment settings impact security. Furthermore, the section on ASP.NET-specific vulnerabilities addresses not only general web application security challenges but also specialized issues and attack vectors, such as ViewState attacks and string termination attacks.
Participants attending this course will
- Understand the fundamental concepts of security, IT security, and secure coding practices
- Gain insight into web vulnerabilities beyond the OWASP Top Ten and learn how to avoid them
- Learn to utilize the various security features available within the .NET development environment
- Acquire practical knowledge in using security testing tools
- Identify typical coding mistakes and understand how to avoid them
- Stay informed about recent vulnerabilities in .NET and ASP.NET
- Access sources and further readings on secure coding practices
Audience
Developers
The Secure Coding Landscape
14 HoursThis course provides an introduction to fundamental security concepts, offering a comprehensive overview of vulnerability characteristics across diverse programming languages and platforms. It elucidates methods for mitigating software security risks throughout the software development lifecycle. While avoiding deep technical intricacies, the curriculum highlights significant and prevalent vulnerabilities in various software development technologies. It also addresses the challenges inherent in security testing, presenting applicable techniques and tools to identify potential issues within code.
Participants attending this course will
- Grasp fundamental concepts of security, IT security, and secure coding practices
- Comprehend web vulnerabilities affecting both server and client sides
- Recognize the severe consequences of improper buffer handling
- Stay informed about recent vulnerabilities in development environments and frameworks
- Learn to identify typical coding mistakes and understand how to prevent them
- Understand security testing approaches and methodologies
Audience
Managers
FreeIPA for Administrators
14 HoursThis instructor-led live training in South Korea (online or onsite) is designed for system administrators who wish to use FreeIPA to centralize authentication, authorization, and account information for their organization's users, groups, and machines.
Upon completion of this training, participants will be able to:
- Install and configure FreeIPA.
- Manage Linux users and clients from a single centralized location.
- Utilize FreeIPA’s CLI, Web UI, and RPC interface to establish and manage permissions.
- Enable Single Sign-On (SSO) authentication across all systems, services, and applications.
- Integrate FreeIPA with Windows Active Directory.
- Backup, replicate, and migrate a FreeIPA server.
Identity and Access Management with Okta
14 HoursThis instructor-led, live training in South Korea (online or onsite) is designed for system administrators who wish to utilize Okta for identity and access management.
By the end of this training, participants will be able to:
- Configure, integrate, and manage Okta.
- Integrate Okta into an existing application.
- Implement security measures using multi-factor authentication.
OpenLDAP Workshop
21 HoursThis instructor-led live training in South Korea (online or onsite) is aimed at intermediate-level system administrators and IT professionals who wish to install, configure, manage, and secure LDAP directories using OpenLDAP.
By the end of this training, participants will be able to:
- Understand the structure and operation of LDAP directories.
- Install and configure OpenLDAP for various deployment environments.
- Implement access control, authentication, and replication mechanisms.
- Use OpenLDAP with third-party services and applications.
Identity and Access Management using OpenAM
14 HoursThis instructor-led, live training in South Korea (online or onsite) is aimed at system administrators who wish to use OpenAM to manage identity and access controls for web applications.
By the end of this training, participants will be able to:
- Set up the necessary server environment to start configuring authentication and access controls using OpenAM.
- Implement single sign-on (SSO), multi-factor authentication (MFA), and user self-service features for web applications.
- Use federation services (OAuth 2.0, OpenID, SAML v2.0, etc.) to extend identity management securely across different systems or applications.
- Access and manage authentication, authorization, and identity services through REST APIs.
OpenDJ for Administrators
14 HoursThis instructor-led, live training in South Korea (online or onsite) is designed for system administrators who want to leverage OpenDJ to manage user credentials within their organization's production environment.
Upon completion of this training, participants will be equipped with the ability to:
- Install and configure OpenDJ.
- Maintain an OpenDJ server, covering monitoring, troubleshooting, and performance optimization.
- Create and manage multiple OpenDJ databases.
- Perform backup and migration tasks for an OpenDJ server.