This course is only available to Military and Law Enforcement Agencies. This course can be customized further for specific groups needs.
Integrating logs/ SIEM
MITRE Corporation ATT&CK model
Graph Theory for Modeling
Dark Web Investigations
Background on TOR
Overview of current markets
Case studies of web site takedowns
Step by step guide to investigations on the dark web
Zero Day Exploits
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.