Module 4 Overview: Tools and Techniques

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
2 hours 26 minutes
Difficulty
Beginner
CEU/CPE
2
Video Transcription
00:00
Welcome to the module number four, which is called tools and techniques parenthesis. Basic.
00:07
I mentioned basic because we will not go in depth off every tool and technique that we will talk about just a little disclaimer there. This is probably the most fun part of the course there. A pleasure off those in tools techniques available out there, some of which are free and other skin cost a pretty penny.
00:24
While it is outside the scope of this course to cover every single Aalesund tool,
00:30
we will cover just a few off the most popular ones that you may find useful for your investigations. First, you will learn about search engines because that is the first stop in any investigation.
00:40
You will go to Google and other search engines out there, which we will talk about Then. There are social networks, which are a great source off information, since people usually do not care for privacy settings of their social laps. And that's why we have tools available like previously mentioned tweet pap from homicide.
00:59
After that, we will mention tools and techniques regarding emails and user names, and immediately after that, we will dive into a few great resource is off leaks and data bridges, which are publicly available.
01:11
I have saved the technical part for last in this module, and there I will show you with what tools you will be able to learn about your target system in more detail.
01:23
In this video, we made a quick overview off module number four, and in the next one we will cover search engines and their usage in the ascent context. Just before we begin our first lesson of this module, I would like to share a cool side fact with you because I think it is relevant to the topic we're going to discuss in this module
01:42
more than 50% off. All Google Web traffic is coming from smartphones and tablets.
01:47
It's good to have that in mind when you are doing your investigations, maybe pivot to a mobile framework. Think about it
Up Next
Open Source Intelligence (OSINT) Fundamentals

In this Open Source Intelligence (OSINT) Fundamentals training course, you will gain fundamental knowledge about OSINT, who uses it, and the ethical implications of using it. Upon completion, students will have a solid understanding of OSINT.

Instructed By