Outstanding Cyber Security Training/Awareness Initiative
NPCC National Cybercrime Programme
The NPCC Cybercrime Training Programme provides police forces in England and Wales with the skills needed to be able to respond to a report of cybercrime and fully investigate any criminal activity, prosecute offenders where necessary but also divert individuals on the cusp of criminal activity on to productive paths. The Programme gives staff the technical skill to advise and protect individuals and organisations in cyber security to help better protect themselves against cybercrime.
Course overview
This Open Source Intelligence (OSINT) boot camp will provide delegates with skills to become efficient and effective at finding those key pieces of intelligence on the Internet and Dark Web. There are a number of key technologies that have allowed these networks to flourish, from cryptocurrency to software that allows anonymity such as Tor. Cybercrime is at the fore-front of criminal innovation. This boot camp is a practical course, allowing delegates the time to explore and understand some of the tools and techniques used by cyber defenders and cybercrime investigators.
Course modules
Module titles
- Module 1 – Basics of the Internet and Devices
- Module 2 – Strategy and Following Each Lead
- Module 3 – Digital Footprints
- Module 4 – Legislation, Preserving & Recording Captures
- Module 5 – Search Engines
- Module 6 – Deep Web
- Module 7 – Background of the Dark Web
- Module 8 – Tor Privacy and Security
- Module 9 – Tor Hidden Services
- Module 10 – Tor Virtual Environments & Applications
- Module 11 – Other Dark Webs
- Module 12 – People and Companies
- Module 13 – Investigating Email
- Module 14 – Image and Video Searching
- Module 15 – Social Media
- Module 16 – Facebook and Messenger
- Module 17 – Twitter
- Module 18 – Other Social Media
- Module 19 – Cryptocurrencies
- Module 20 – Advanced Open Source Tools
Bootcamp exercises
- Exercise 1 – Look up your MAC address
- Exercise 2 – Address Resolution Protocol
- Exercise 3 – Lookup your IP addresses
- Exercise 4 – Autonomous Systems Numbers
- Exercise 5 – DNS Lookup
- Exercise 6 – WHOIS Lookups
- Exercise 7 – Trace route
- Exercise 8 – Internet Infrastructure using Robtex for target reconnaissance
- Exercise 9 – Investigate counterfeiting websites
- Exercise 10 – Investigate counterfeiting websites further analysis
- Exercise 11 – Beware check the domain
- Exercise 12 – view the source code
- Exercise 13 – Beware of Malicious JavaScript on websites
- Exercise 14 – Tracking Cookies
- Exercise 15 – Find analytical codes within the Source code
- Exercise 16 – Robots.txt
- Exercise 17 – Large scale NAT on mobile
- Exercise 18 – Which VPN do I choose?
- Exercise 19 – What are the consequences for doing Open source Intelligence research?
- Exercise 20 – Creating a “sock puppet”
- Exercise 21 – Select your target and persona
- Exercise 22 – What is a digital footprint?
- Exercise 23 – Your digital footprint?
- Exercise 24 – Check out your browser
- Exercise 25 – Personal Search Exercise
- Exercise 26 – Check out this tool to find OSINT information
- Exercise 27 – Test Browser Leakage Exercise
- Exercise 28 – User Agent Switcher
- Exercise 29 – Referrer Header
- Exercise 30 – Autofill phishing
- Exercise 31 – Password strength checker
- Exercise 32 – Zotero
- Exercise 33 – HTTrack Website Copier
- Exercise 34 – Copy webpage
- Exercise 35 – AOL Data Breach
- Exercise 36 – Using a search engine
- Exercise 37 – Check out the following search engines
- Exercise 38 – Google advanced search hacking and CSE
- Exercise 39 – Using a search engine
- Exercise 40 – The Web
- Exercise 41 – Meta and Federated Search engines
- Exercise 42 – Open Source Intelligence websites
- Exercise 43 – Pastebins
- Exercise 44 – Hacker and Carding Forums and Chatrooms
- Exercise 45 – Public Records Worldwide
- Exercise 46 – Document and Document Metadata Deep Web search tools
- Exercise 47 – Archive.org - Advanced searching exercise
- Exercise 48 – Archive.is searching exercise
- Exercise 49 – Data Breaches – Archives
- Exercise 50 – Tor
- Exercise 51 – Tor Relay Exercise
- Exercise 52 – Installing Tor
- Exercise 53 – Navigating the Dark Web
- Exercise 54 – Engaging in chat on Tor
- Exercise 55 – Tor forums and community links
- Exercise 56 – Tor forums and community links
- Exercise 57 – Accessing the I2P dark web
- Exercise 58 – Accessing Freenet dark web
- Exercise 59 – Accessing Freenet dark web
- Exercise 60 – Accessing Open Bazaar dark web
- Exercise 61 – Finding people/director
- Exercise 62 – E-mail Header analysis
- Exercise 63 – E-mail address permutations
- Exercise 64 – E-mail address validation tools
- Exercise 65 - Domain Name Searching to find email address
- Exercise 66 - Compromised email search tools
- Exercise 67 - Automated scraping using Kali Linux
- Exercise 68 - Image and Facial Searching
- Exercise 69 - EXIF data
- Exercise 70 - Image and Facial Searching
- Exercise 71 - Image Analysis
- Exercise 72 - Image Analysis
- Exercise 73 - Image Analysis
- Exercise 74 - Geolocation Exercise
- Exercise 75 - Facebook Exercise
- Exercise 76 - Facebook Friend Extraction
- Exercise 77 - Twitter
- Exercise 78 - Twitter searching
- Exercise 79 - Social Media searching
- Exercise 80 - Social Media searching
- Exercise 81 - Social Media searching
- Exercise 82 - Social Media searching
- Exercise 83 - Social Media searching
- Exercise 84 - Flickr and Pinterest
- Exercise 84a -Searching a forum, blog, vlog, internet board
- Exercise 85 - Reddit
- Exercise 86 - Bitcoin Research
- Exercise 87 - Assassination transaction
- Exercise 88 - Tracking DPR’s Bitcoin transaction
- Exercise 89 - How Were Tor Users Deanonymized Via Their Bitcoin Transactions?
- Exercise 90 - OSINT Exercise
- Exercise 91 - FOCA (Fingerprinting Organizations with Collected Archives)
- Exercise 92 - Atomic email hunter
- Exercise 93 - Using Maltego to perform reconnaissance