Video Description

Adversary Infrastructure and the Dark Web This lesson discusses campaigns and open source threat intelligence. This consists of: - Characterizing the adversary

  • Identifying adversary infrastructure

  • Threat agents

In addition, this lesson also discusses using the Dark Web or Deep Web as a resource. According to experts, 96% of the Internet is hidden and there are many unknown resources available. When utilizing the Dark Web/Deep Web for research, it is important to exercise extreme caution as it is heavily monitored.

Course Modules