Course Overview

This learning path will serve as a hands-on guide for ethical hackers to access the dark web safely and get the most out of it. By the end of this learning path, you'll know how to conduct an effective dark web research, while staying safe from the hotbed of criminal activities and the dangers that they offer.

What You Will Learn

  • Understand the importance of securing and protecting your infrastructure and data.
  • Familiarize yourself with the different tools that can be used to implement cyber deception.
  • Learn the difference between Dark and Deep web
  • Learn to stay safe on the dark and deep web

Program Curriculum

Content
  • Chapter 1: Technical Background
  • Chapter 2: Tour of Markets
  • Chapter 3: Investigative Techniques

Content
  • Chapter 1: Introduction
  • Chapter 2: What is Cyber Deception?
  • Chapter 3: History of Cyber Deception
  • Chapter 4: Intrusion Detection
  • Chapter 5: Honeypots
  • Chapter 6: Generating Alerts
  • Chapter 7: How to Keep Attackers Running in Circles?
  • Chapter 8: Conclusion

Content
  • Chapter 1: Introduction to Dark Web
  • Chapter 2: Importance of the Dark Web and How Dangerous It Is
  • Chapter 3: Staying Safe on the Dark Web
  • Chapter 4: Cyber Threat Intelligence and Dark Web
  • Chapter 5: Dark Web Automation
  • Chapter 6: Conclusion

Instructor

Omar Rajab

Omar is a Cybersecurity analyst and penetration tester at Black Hatch, with up to 4 years of experience in ethical hacking. He writes his own Security tools, and vulnerability studies and mitigates them including planning and implementing security measures to protect computer systems, networks, and data. In addition, he teaches several cybersecurity subjects and delivers many training programs covering mobile hacking, network hacking, offensive, and defensive, and most importantly delivering security awareness for all ages.

Dr. Chuck Easttom

Dr. Chuck Easttom has many years of practical experience in wide range of computer science, mathematics, and related topics. He holds a Doctor of Science in Cyber Security (Dissertation:"A Comparative Study Of Lattice Based Algorithms For Post Quantum Computing" ) a Ph.D. in Technology (Dissertation: "The Effects of Complexity on Carbon Nanotube Failures"), A Ph.D. in Computer Science (Dissertation "A Systematic Framework for Network Forensics Using Graph Theory") and 3 masters degrees (including 1 in applied computer science, 1 in education, and 1 in systems engineering). He has authored 36 computer science books ( so far) and is an inventor with 25 computer science patents, and over 70 research papers. He was a subject matter expert for CompTIA in the creation of their Security+, Linux+, and Server+ certification tests and on the Job Task Analysis team for CEH v8. He created the OSForensics certification test and course. He currently holds over 70 IT certifications (A+, Network+, iNet+, Linux+, Server+, MCP, MCAD, MCSA, MCSE, MCDBA,MCTS, MCITP, CEH, CHFI, CISSP, CCFP, ISSAP, and more). Dr. Easttom is a Distinguished Speaker of the ACM, a Distinguished Visitor of the IEEE, as well as a Senior Member of the ACM (Association of Computing Machinery) and a Senior Member of the IEEE (Institute of Electrical and Electronics Engineers). He is also a member of INCOSE (International Council on Systems Engineering) and IACR (International Association of Cryptological Research). You can find more, and book errata at www.chuckeasttom.com

Salvador Beltrán Obiol

Salvador Beltrán Obiol worked for the largest telecommunication infrastructure provider in Spain and is now working in the cybersecurity department of a Fortune 500 company in the US. His experience extensive experience in research and work environments gives him a unique perspective on systems. His knowledge of telecommunications and networks (wired and wireless) allows for a well-rounded view of infrastructures. Salvador has managed deployments involving thousands of network equipment and endpoints. Allowing the opportunity to see, prevent, and help recover from several security incidents in different infrastructures in several sectors, including critical resources and infrastructure.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering video-based learning with 840+ courses and diverse Learning Paths to enhance your skills.

$ 69.00
Billed monthly or $599.00 billed annually

What is included

  • 840+ Premium Short Courses
  • 70+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs and CTF Challenges for comprehensive skill-building.

$ 79.00
Billed monthly or $699.00 billed annually

Everything in Pro and

  • 1400+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month

Related Learning Paths

1 of 50

Quick View

Practical Dark Web for Ethical Hackers

Skip to product information
1 of 1
What's included
  • Full Video Access
  • Self-Paced Study Guide
  • 6 months of access to virtual labs
  • Once redeemed, this bundle will be valid for 12 months
  • Self-Paced Study Guide
  • Exam Voucher + Retake
View full details

Practical Dark Web for Ethical Hackers

Practical Dark Web for Ethical Hackers