Time
2 hours 26 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:00
Welcome back
00:02
in the last video, we did a quick overview of this third module, and then this lesson. Some of the things you will learn is what kind of computer and operating system you need, which in which in fertilization software, you should use what we paean to choose and why.
00:17
How to choose a safe Internet browser or, even better, how to make your browser
00:22
safer
00:23
First, the idea on between me to focus is a clean computer or a host. This computer can be a desktop or a laptop machine, which is dedicated just for doing. Oh, since investigations. Maybe it's a little too much to buy a new computer every time you do a new investigation or to do a fresh install of your machine.
00:42
But there is a great and elegant way to do this efficiently
00:46
by using V EMS, a virtual machine on that sits on top off your host. I recommend doing the utilization with a great free program called Virtual Box. Ah, great feature of using virtual machines is the use of snapshots.
01:03
This snapshots are literally saved moments in time off your patrol machine state, and you can revert to original configuration or set up you saved at any time.
01:12
This is great for doing all kinds of testing and in the end, great for your Postant investigations.
01:19
Next would be to choose an operating system for your recent investigations. If you are a Windows user and you never worked or used a Lennox, I would say Use Windows also, if you were. If you're a Mac offs user and I worked on any other operating systems, then I would say using Mac OS.
01:40
But I would like to mention and you have probably heard of it,
01:42
a great operating system, which you can and probably will use for euros and investigations that it's called the Cali Lennox, and you should really get familiar with it, since it is the factor. The standard of the cybersecurity community
01:59
also would like to mention besides virtualization. With linens, you have a possibility to use it as a USB booted operating system alive distribution, but with the persistent option on so you could save some work in it.
02:12
Callen Lennox is mostly used by penetration testers because if it's built in security tools, but those built in tools that they use are also involved in your work. The fact remains that the first step in any engagement is re learning more about your type.
02:28
Next, I have to put a great emphasis on using a virtual private metric or a BPM. In my opinion, every oh sent investigator should possess one. When used correctly, Olympian masks your identity online and thus protecting your privacy. You're maybe already using a VPN
02:46
if you're working for, ah, large corporation, so you understand the concept behind it.
02:52
But I would never recommend to use that kind of connection for your Olsen to work, I'd recommend in purchasing a dedicated VP and subscription.
03:00
And if you're now thinking well, there are free solutions. You would be right. But from my experience, free solutions do not work well. They either have limited functionalities or are too slow. I personally use VPN, F Secure Freedom or the Proton VP. And at this moment I'm very satisfied with spa
03:21
beads and the thing that they respect user privacy and also enforce a no locks policy.
03:27
Each of the mentioned VPN providers allow me to connect to your choice off dozens of servers worldwide. That would mean when you need to appear that you're from London, you choose London or if you need to appear that you're coming from the U. S. East Coast,
03:44
you choose East Coast in your VPN software.
03:46
Lastly, I would like to mention Web browsers. I believe that any oh sent researcher should avoid inbuilt operating system browsers like Microsoft Internet Explorer, Microsoft Edge or these or this safari browser from Apple. And the main reason is privacy or lack of privacy.
04:05
That's why I recommend using Google Chrome or Mozilla Firefox, but with constant is ations. That includes modifying many configuration settings inside the browser and using all kinds of different adults and extensions. I recommend Googling oh sent browser hardening
04:23
for further studies and if you're interested into a different approach
04:27
on searching the Internet, Google Brave browser and try that browser In this video, we went over on creating a secure computer environment for your basic owes and investigations, which includes choosing a computer over in the system. We talked about virtualization using a VPN
04:45
and what to do with the choosing, often Internet browser.
04:48
And in the next video we will cover the notes taking part off euros and investigations. So see you there

Up Next

Open Source Intelligence (OSINT) Fundamentals

In this Open Source Intelligence (OSINT) Fundamentals training course, you will gain fundamental knowledge about OSINT, who uses it, and the ethical implications of using it. Upon completion, students will have a solid understanding of OSINT.

Instructed By

Instructor Profile Image
Tino Sokic
CEO at DobarDan
Instructor