Module 3 Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

2 hours 26 minutes
Video Transcription
in this module three called the Olsen Playground we went through, we could say the technical preparations off innocent investigation. We talked about creating a secure computer environment than about taking notes and documenting the investigation findings.
After that, we talked and showed the usage off password manager. And in the end, we went through the validation part. Often investigation.
The next module, called tools and techniques, is dedicated to a topic that you have been probably waiting to come, or you just fast forward to this part. Either way, we're going to talk about different oaths and tools and techniques that you can use in euros and investigations. I have to remind you just off one thing.
Remember what Sherlock Holmes said?
Keep his quote in mind while conducting your investigations. See you in the next video.
Up Next
Open Source Intelligence (OSINT) Fundamentals

In this Open Source Intelligence (OSINT) Fundamentals training course, you will gain fundamental knowledge about OSINT, who uses it, and the ethical implications of using it. Upon completion, students will have a solid understanding of OSINT.

Instructed By