Explains and demonstrates how to setup a computer safely and how its on-line footprint can be identified & altered
This module explains how to set-up a computer for safe III (OSINT) research with demonstrations of VM and emulator deployment and browser selection and optmisation. Then the footprint & fingerprint are explained along with the measures that should be taken to obfuscate, so that the investigator can operate undetected.
The trainee will have learned how to set-up a computer for safe and effective III (OSINT) research; how they can be detected by other people, as a consequence of their online activity and the steps to take to not compromise themselves, their organisation and the investigation.
Module 3 does not differentiate between the public and private sectors.
PREPARING THE COMPUTER
OPERATING SYSTEM SELECTION
THREATS & VULNERABILITIES
PROTECTING THE WORKSPACE
ON PREM -V- REMOTE DEPLOYMENT
VIRTUALISATION & EMULATION
THE HYPERVISOR & VM DEPLOYMENT
EMULATOR SELECTION & DEPLOYMENT
UNDERSTANDING & COMPARING BROWSERS
COOKIES & THE III (OSINT) INVESTIGATOR
COMPUTER FOOTPRINTS & PROTECTION
COMPUTER FINGERPRINTS & PROTECTION
SAFE PASSWORD MANAGEMENT
Preparation (PDF): 01:30
Live Online Training: 02:30
Module Assessment: 00:20