Cyber Dark Arts highlights ‘dark’ or deceptive activities that are
employed by malicious users via the Internet. Several legitimate purpose
technologies and techniques and how they are leveraged, or manipulated
for fraudulent purposes, is discussed. Threats from topics such as
zero-day attacks, dark web, alternate OSs, VPN/TOR, weaponized
psychology, and anonymous services will be detailed, as well as methods
for concealing one’s identity. These methods are taught in order for
cybersecurity experts to defend against such attacks.
The course includes reinforcing video demonstrations.
Learning Objectives:
Explain several techniques for obfuscating online activities
List examples of technologies leveraged for deceptive purposes
Detail best practices for prevention and protection from malicious cyber activities
NICCS Specialty Areas:
Collect and Operate: Cyber Operations
Operate and Maintain: Systems Analysis
Protect and Defend: Cyber Defense Analysis
Most of it was review for me, though the module on Weaponized Psychology was really interesting. Essentially, it focused on social engineering in relation to social media. The term weaponized disinformation (i.e., fake news) was used a lot. Other modules discussed anonymous web hosting, searching, and browsing and the use of TOR, TAILS, and Whonix and secure messaging services such as ProtonMail. There was a rather lengthy discussion on blockchain and cryptocurrency. They also showed demos on password cracking with Hydra, vulnerability scanning, TOR, and others. It's a good general education. They never said that any tools or techniques were bad or good; instead, they discussed how both sides use them.
This course and FedVTE are available only to people with government email addresses.
I am enjoying...I haven'y started the blockchain as it was 40mins (as most other sections were <10 mins), I guess sometimes my ADD makes me wonder off and have to break it into smaller chunks...I will finish it today though. I like the newer videos they are putting out there, rather than some of the powerpoint slides in classroom setting they like showing...as those can get real boring quickly, I can see the attendees fading off to neverneverneverland.
I am enjoying...I haven'y started the blockchain as it was 40mins (as most other sections were <10 mins), I guess sometimes my ADD makes me wonder off and have to break it into smaller chunks...I will finish it today though. I like the newer videos they are putting out there, rather than some of the powerpoint slides in classroom setting they like showing...as those can get real boring quickly, I can see the attendees fading off to neverneverneverland.
To be honest, I had trouble getting through that blockchain discussion and demo, especially since I have no interest in it.
Comments
Cyber Dark Arts highlights ‘dark’ or deceptive activities that are employed by malicious users via the Internet. Several legitimate purpose technologies and techniques and how they are leveraged, or manipulated for fraudulent purposes, is discussed. Threats from topics such as zero-day attacks, dark web, alternate OSs, VPN/TOR, weaponized psychology, and anonymous services will be detailed, as well as methods for concealing one’s identity. These methods are taught in order for cybersecurity experts to defend against such attacks. The course includes reinforcing video demonstrations.
Learning Objectives:
- Explain several techniques for obfuscating online activities
- List examples of technologies leveraged for deceptive purposes
- Detail best practices for prevention and protection from malicious cyber activities
NICCS Specialty Areas:To be honest, I had trouble getting through that blockchain discussion and demo, especially since I have no interest in it.
Something something something Dark Side!
Great! Yeah, I should do that.
ICP-FDO ▪ CISSP ▪ ECES ▪ CHFI ▪ CNDA ▪ CEH ▪ MCSA/MCITP ▪ MCTS ▪ S+
2020 Level Up Goals: (1) DevSecOps Learning Path (2) OSCP
Right. https://fedvte.usalearning.gov/