• duration
    5 days
  • GSA CATALOG
    GS-02F-0044T
  • Dark Web Council
    Official Training
  • Guaranteed Dark Web
    Certification

As the Dark Web grows and its uses expand, the need for skilled professionals with experience with this tool will continue to grow.

Certified Dark Web Analyst Boot Camp

Our Dark Web Council Certified Dark Web Analyst Boot Camp is a comprehensive review of the Dark Web in today’s environment, combined with our award-winning CDWA-320 exam preparation.

In this course, you will discover navigational techniques over Dark Networks and develop defensive and analyst skillsets including learning about Dark Web marketplaces, finding exfiltrated corporate assets, how to anonymize your investigative efforts.

WHY CHOOSE TRAINING CAMP, DARK WEB COUNCIL PARTNER OF THE YEAR?

The Dark Web is a vast, well-traveled, and nearly ignored waypoint of exfiltrated corporate assets as well as discussions of network attacks and methodology. Information security regularly overlooks the significance of this largely untapped resource. Our goal is to give you the tools you need to hit the ground running, right after class.

What’s Included

Official Dark Web Council CDWA Courseware
Advanced Dark Web Crawler Tool Kit Review
Practical Hands-on Labs
Exam Prep Review Sessions
Certification Exam Voucher
Exam Pass Guarantee
Certificate Of Completion (50 Hours)

Exam Covered

CDWA-320 – Certified Dark Web Analyst

Need Dark Web Training for your Team?

Our courses can be delivered to your site or in a private group setting, tailored to meet the learning goals of your organization. Save up to 40% and your satisfaction is GUARANTEED!

Click to learn more about our group training.

training features

  • Official Dark Web Council Training

  • Official Dark Web Exam Onsite

  • CPE/CEU Post Class Package

  • Featured on CNN, FOX News, MSNBC, Reuters

  • 98% Student Satisfaction Rate

Dark Web Council Training Partner

The Dark Web Council is an industry acclaimed organization looking to illuminate the mystery of the Dark Web. With the mystery revealed, we can show other defenders how to leverage this knowledge into a vital facet of any risk management strategy.

  • DWC Approved Dark Web Certified Instructors

    We utilize Authorized DWC instructors who are Subject Matter Experts well-versed in accelerated learning and exam preparation during our Dark Web boot camp. Their delivery accommodates every student's learning needs through individualized instruction, lab partner and group exercises, independent study, self-testing, and question/answer drills.

  • Customized Dark Web Crawlers Lab Sessions

    These comprehensive labs helps to demonstrate concepts, frameworks and real-life scenarios on how to explore and extract useful intelligence from non-traditional web sources.

  • Anonymous PC Building Review

    Our course includes value-added review sessions featuring how to build devices, about anonymized operating systems, culminating with the installation and configuration of a system capable of providing safety and security while navigating the Dark Web. This allows students to understand what is required to create your defensive position.

  • Training Camp CPE/CEU Post Class Support

    As a value-add to this Dark Web program, we provide supporting documentation for CPE/CEU credits for most major certification bodies. With our vendor partnerships, you will be able to earn CPE/CEU's without any issues or concerns on mapping the outlines to your requirements.

Dark Web Analyst Course Outline

Our courses are boosted with Training Camp’s exam prep methodology so your course content will always be up-to-date with the most current version of the exam. The following topics are general guidelines for the content. In order to better reflect the contents of the exam and for clarity purposes, the outline below may change at any time without notice.

DOMAIN 1: FUNDAMENTALS OF IT SECURITY

A walkthrough of fundamental IT concepts and foundations
• Understand and Apply Concepts of Confidentiality, Integrity, Availability, and Anonymity
• Security Governance Principles
• Principles of Security
• Identification, Authentication, Authorization, and Accounting
• Cryptography and Asset Protection Techniques
• Distinctions between Privacy, Anonymity, and related goals
• Establishing a Private Investigation Workstation
• Principles of Virtualization and the Merits and Flaws of Various Options
• Private Browsing and Tracker/Fingerprint Mitigation
• Out-of-Band Communication Techniques
• Verification of Authenticity Regarding the Acquisition and Installation of Tools

DOMAIN 2: GOVERNANCE, RISK, AND COMPLIANCE

An exploration of organizational concepts, risk management, and legal/regulatory concerns.
• Concepts of Governance
• Understand Legal and Regulatory Issues that Pertain to Information Security globally
• Working with Law Enforcement (developed in conjunction with the Secret Service)
• Understand and Apply Dark Web Threat Modeling
• Forensics Investigations and the Dark Web
• Understand Business Continuity / Disaster Recovery Plans in relation to Dark Web attacks
• Understand and Implement Dark Web Professional Ethics
• Establish and Manage Security Education, Training, and Awareness of CIAA Topics

DOMAIN 3 – HISTORY OF THE INTERNET, DEEP WEB AND DARK WEB

A historical account of modern networking and the origins and definitions of the Web
• Definitions and Terminology
• History of the Internet
• History of the Deep Web
• Understanding the Deep Web
• History of the Dark Web
• Applying the Dark Web in a modern context

DOMAIN 4 – NETWORKING AND ROUTING ON THE DARK WEB

A technical account of modern networking and the role of TOR and Dark Net infrastructure.
• Communication Models
• Routing the Internet Protocol (IP)
• Observing Traffic Across a Network
• About TOR—The Onion Router
• Other Dark Networks (e.g. I2P)
• Understanding Dark Networks
• Understanding End-To-End Encryption
• Understanding Virtual Private Networks
• Drawing Distinctions Between VPN Privacy and Dark Web Anonymity
• Principles of Cryptography, Dark Networks, and Establishing Anonymity

DOMAIN 5 – ANONYMITY, THE DARK WEB, AND YOU

A discussion and explanation of technical and organizational implications for anonymity.
• Establishing and Maintaining Anonymity
• Discovering and Understanding Dark Web Content
• Establishing and Maintaining a Presence on the Dark Web
• Moving Between Surface, Deep, and Dark Web Content
• Identifying Best Practices
• Understanding and Using Cryptocurrency
• Leveraging Cryptocurrency Soft and Hard Wallets
• Exploring Dark Web Link Lists
• Exploring Dark Web Search Options
• Understanding Dark Web Markets
• Buying and Selling on the Dark Web
• Detecting and Avoiding Fraud on the Dark Web
• Leveraging Anonymous Messaging on the Dark Web
• Securely Storing Information

DOMAIN 6 – CRAWLERS AND DATA DISCOVERY IN THE DARK WEB

A high-level framework of analysis including GRC implications and praxis.
• Understanding Principles of OSInt
• Leveraging a Custom Information Discovery Framework
• Establishing Incident Response and Controls Introduction
• Navigating, Building, and Using Crawlers
• Integrating Dark Web into defender activities

Certified Dark Web Analyst -Course Objectives

• Learning the origin and motives beyond Dark Network creation and evolution
• Relating Dark Web marketplaces and exfiltrated corporate assets
• Relating Dark Web content to your organization’s effort to secure assets
• Learning to find content on the Dark Web given the lack of conventional search
• Leveraging anonymizing technologies to enhance investigative efforts
• Capitalizing on the distinctions between privacy and anonymity
• Exploring technologies that provide or enhance privacy and anonymity
• Creating an anonymous Dark Web persona
• Conducting investigations with anonymous messaging and network access
• Gaining entry to otherwise restricted forums and markets
• Learning how cryptocurrencies and exploring alternatives beyond Bitcoin
• Learning how cryptocurrencies can be traceable and which ones afford greater anonymity
• Establishing methods for collecting and storing data securely
• Learning how and why work with Law Enforcement can facilitate investigation
• Learning how to configure a private and anonymous workstation
• Learning about alternative messaging technologies such as Bitmessage
• Learning about alternative Dark Networks such as I2P (Invisible Internet Project)
• Learning how to find exfiltrated data on the Dark Web
• Analyzing data on the Dark Web and answering questions such as:
• How did data get on the Dark Web?
• How can we minimize the effects of that data exfiltration?
• How can we enhance our abilities to detect/prevent future exfiltration?
• Making use of the Dark Web response as part of Incident Management
• Making Dark Web a source for research regarding competitors and subjects of interest

Need dedicated training?

All courses can be delivered to your site or virtually in a private-group setting, customized to meet your organization’s learning objectives. Save up to 40% and your satisfaction is GUARANTEED!

Click to learn more about our group training.

Certified Dark Web Analyst -Target Student

Any information security professional, including the CISO, Red Team, and Business Analyst, Network Security Administrator, and Risk Management Professional, can substantially benefit from an enhanced appreciation for private and anonymous technologies. This course is primarily designed for information security professionals who are tasked with conducting investigations and defending organizational assets. This training will augment the expertise of Penetration Testers exploring new avenues of potential exploit.

In addition, business analysts can benefit by exploring additional sources of information regarding threats to organizational assets. Risk management professionals can glean information about current threats to organizational assets. Network administrations will better be able to determine whether such technologies are being used on corporate networks without authorization. CISOs will be able to better establish policy regarding the safe habits of employees and interactions with customers. Further, privacy enthusiasts, concerned with their ability to establish and maintain safer online habits, will learn valuable techniques and concepts necessary to operate over private connections and Dark Networks.

Testimonials

Buzz was an outstanding instructor and presented the information in a very understandable and memorable format. I could not have asked for a better classroom experience.
Charles Dailey USAF
The class was very interactive with students providing their real world experience to supplement the course material.
Chris Louie IronKey by Imation
Great experience! Great instructors with great knowledge to transfer to people!
Jacob T
I would highly recommend attending a Training Camp class to increase your knowledge on a specific subject or make yourself more marketable by validating your knowledge.
Chris Pettingill MEI
I believe self-study would have been much much harder to comprehend the information and pass the test on a first try. My colleagues who self-studied flunked the first time they took it. I passed the first time after attending the boot camp.
TS Comcast
The Training Camp experience was well organized and super-informative. The instructor's experience and ability to communicate made the training worth more than it's weight in gold! I highly recommend the CISSP course at Training Camp!
CL SecureStrux, LLC
01 06