III-OSINT-Module 3: Computer Set-up, Security, Footprints & Fingerprints

Explains and demonstrates how to setup a computer safely and how its on-line footprint can be identified & altered

TRAINING OBJECTIVES

This module explains how to set-up a computer for safe III (OSINT) research with demonstrations of VM and emulator deployment and browser selection and optmisation. Then the footprint & fingerprint are explained along with the measures that should be taken to obfuscate, so that the investigator can operate undetected.

LEARNING OUTCOMES

The trainee will have learned how to set-up a computer for safe and effective III (OSINT) research; how they can be detected by other people, as a consequence of their online activity and the steps to take to not compromise themselves, their organisation and the investigation.
 

PUBLIC/PRIVATE SECTOR DIFFERENTIATION

Module 3 does not differentiate between the public and private sectors.

MODULE CONTENTS

PREPARING THE COMPUTER
OPERATING SYSTEM SELECTION
THREATS & VULNERABILITIES
PROTECTING THE WORKSPACE
ON PREM -V- REMOTE DEPLOYMENT
VIRTUALISATION & EMULATION
THE HYPERVISOR & VM DEPLOYMENT
EMULATOR SELECTION & DEPLOYMENT
UNDERSTANDING & COMPARING BROWSERS
BROWSER VULNERABILITIES
BROWSER SELECTION
BROWSER OPTIMISATION
BROWSER EXTENSIONS
COOKIES & THE III (OSINT) INVESTIGATOR
COMPUTER FOOTPRINTS & PROTECTION
COMPUTER FINGERPRINTS & PROTECTION
SAFE PASSWORD MANAGEMENT

Module 3
CPD Credits: 4.5 Hours
Duration:

Preparation (PDF): 01:30

Live Online Training: 02:30

Module Assessment: 00:20

CPD Certificate: